• Unraid OS version 6.10.0-rc5 available


    limetech

    Listening to the Community we decided to remove the requirement for all users to register their server with an Unraid.net account.  Making use of the My Servers plugin, providing a growing number of online-enabled features, does still require use of an Unraid.net account.

     

    Upon upgrade to this release, users who currently have the My Servers plugin installed should upgrade the plugin on their server(s). Servers without the plugin will no longer need, or be able to sign in to Unraid.net and as timeouts kick in, they will automatically be removed from the My Servers Dashboard and disassociated with your Unraid.net account. To continue using the My Servers Dashboard please install the My Servers plugin.

     

    Please note: It would be extremely helpful to us to report issues by creating separate Reports here rather than creating a reply in this topic.

     


    6.10.0 Summary of Changes and New Features

     

    As always, prior to updating, create a backup of your USB flash device:  "Main/Flash/Flash Device Settings" - click "Flash Backup".

     

    [rc3] Plugin Authors:  We patched the upgradepkg script to prevent it from replacing an installed package with an earlier version of the same package, i.e., no downgrading.  If a plugin really needs to replace a package with a downgraded version it can include the '--reinstall' option.

     

    Also be sure to check out the Dynamix File Manager plugin available now through Community Apps!

     

    UPC and My Servers Plugin

    The most visible new feature is located in the upper right corner of the webGUI header.  We call this the User Profile Component, or UPC.  The UPC allows a user to better manage their registration keys and install the optional My Servers plugin.

     

    My Servers is what we call our set of cloud-based services and features that integrate with your Unraid server(s).  After installing the My Servers plugin, you will be prompted to sign-in your server with an existing Unraid.net account, or create a new Unraid.net account.  Once installed here are some of the features of My Servers:

    • Real-time Status - with the plugin installed each server tile on the My Servers Dashboard will display real-time status such as whether the server is online or offline, storage utilization and other information. 
    • Local Access link - this is a direct link the the server webGUI on your LAN.
    • Remote Access link - if enabled, a link is displayed on the My Servers Dashboard to bring up a server webGUI remotely and over the Internet.
    • Automatic Flash Backup - every registered server is provided with a private git repo initially populated with the contents of your USB flash boot device (except for certain files which contain private information such as passwords).  Thereafter, configuration changes are automatically committed.  A link is provided to download a custom zip file that can be fed as input to the USB Flash Creator tool to move your configuration to a new USB flash device.
    • Notification of critical security-related updates.  In the event a serious security vulnerability has been discovered and patched, we will send out a notification to all email addresses associated with registered servers.
    • Posting privilege in a new set of My Servers forum boards.

     

    Signed-in servers maintain a websocket connection to a cloud-based Lime Technology proxy server for the purpose of relaying real-time status.  Refer to the Privacy section for more information.
     

    Security Changes

    • It is now mandatory to define a root password.  We also created a division in the Users page to distinguish root from other user names.  The root UserEdit page includes a text box for pasting SSH authorized keys.
    • For new configurations, the flash share default export setting is No.
    • For all new user shares, the default export setting is No.
    • For new configurations, SMBv1 is disabled by default.
    • For new configurations, telnet, ssh, and ftp are disabled by default.
    • We removed certain strings from Diagnostics such as passwords found in the 'go' file.

     

    Virtualization

    Both libvirt and qemu have been updated.  In addition, qemu has been compiled with OpenGL support, and [rc2] ARM emulation (experimental).

     

    [rc2] To support Windows 11 which requires TPM and Secure boot, we have added TPM emulation; and, added a "Windows 11" VM template which automatically selects TPM-aware OVMF bios.  Also, here are instructions for upgrading a Windows 10 VM to Windows 11.  Special thanks to @ich777 who researched and determined what changes and components were necessary to provide this functionality.

     

    The built-in Firefox browser available in GUI-mode boot is built as an AppImage and located in the bzfirmware compressed file system image.  This saves approximately 60MB of RAM.

     

    The Wireguard plugin has been integrated into webGUI, that is, no need for the plugin.  If you had the plugin installed previously, it will be uninstalled and moved to the "Plugins/Plugin File Install Errors" page. No action is needed unless you want to press the Delete button to remove it from that page. Your WireGuard tunnels and settings will be preserved.

     

    [rc5] Resident network guru @bonienl has added the capability to bind a Wireguard virtual network interface to a docker container.  One use of this feature is to configure a Wireguard-enabled VPN which may then be exclusively used by that container, while you main server makes use of the normal LAN network interface.  Please refer to this post for additional details.

     

    Simplified installation of the Community Apps plugin.  The webGUI automatically includes the Apps menu item, and if CA is not already installed, the page offers an Install button.  No need to hunt for the plugin link.

     

    [rc3] Moving to Let's Encrypt wildcard SSL certificates. 

    Starting with this release, we no longer issue new single-host SSL certificates (which we're calling legacy certificates).  Instead, all new Unraid.net SSL certificates are wildcard certificates (still provided by Let's Encrypt). 

     

    The URL used to access your server making use of a wildcard certificate has this form:

    • https://[lan-ip].[hash].myunraid.net

    where,

    • [lan-ip] is your severs LAN IP address with dots changed to dashes
    • [hash] is a 40-character hex string (160 bits) unique to this server (and different from similar [hash] in legacy certificates)

    example:

     

    We added a new DDNS server which listens at "myunraid.net".  This server extracts [lan-ip] from the domain name and returns the IP address where the dashes are changed back into dots.  There are several benefits to this approach for both our users and for us:

    • Eliminates DNS propagation delays when you first provision a certificate or when a server LAN IP address (or WAN IP address) changes.  Since the domain name includes the IP address, any IP address change also changes the domain name, hence will not be contained in any intermediate DNS cache.  We also changed the TTL from 1 hour to 7 days further reducing overhead and alleviating issues where someone's internet goes down for brief periods.
    • There is no longer a requirement for the server to actively update a DDNS server.
    • Improves privacy because your remote access WAN IP address can't be determined by simply prepending "www" to your local access URL.
    • Moves DNS functionality off the 'unraid.net' domain and isolates it on 'myunraid.net' domain.

     

    In previous releases code that provisions (allocates and downloads) an Unraid.net SSL certificate would first test if DNS Rebinding Protection was enforced on the user's LAN; and, if so, would not provision the certificate.  Since there are other uses for a LE certificate we changed the code so that provision would always proceed.  Next, we changed the logic behind the Auto selection of "Use SSL/TLS" setting on the Management Access page.  Now it is only possible to select Auto if both a LE certificate has been provisioned and DNS Rebinding Protection is not enforced.  This is a subtle change but permits certain My Servers features such as Remote Access.

     

    Upon upgrading, you will need to modify any server bookmarks with the new the URL.  Alternately, if you have installed the My Servers plugin, a local access link is included for each server on your Dashboard.  If you have not installed My Servers plugin, since there is no DDNS update daemon, we recommend setting up either a static DHCP lease, or assign a static IP address for your server.  Finally, we have set up nginx such that the URL's:

    • http://<server-name>.<local-tld>/

    or

    • https://<server-name>.<local-tld>/

    will redirect to https://[lan-ip].[hash].myunraid.net

     

    More information including use cases may be found in Documentation here.

     

    Linux Kernel

    Upgrade to [rc4] Linux 5.15.x kernel which includes so-called Sequoia and Dirty Pipe vulnerability mitigations.

     

    In-tree GPU drivers are now loaded by default if corresponding hardware is detected:

    • amdgpu
    • ast
    • i915
    • radeon

     

    These drivers are required mostly for motherboard on-board graphics used in GUI boot mode.  Loading of a driver can be prohibited by creating the appropriate file named after the driver:

    echo "blacklist i915" > /boot/config/modprobe.d/i915.conf

    Alternately, the device can be isolated from Linux entirely via the System Devices page.  Note that in Unraid OS 6.9 releases the in-tree GPU drivers are blacklisted by default and to enabling loading a driver you need to create an empty "conf" file.  After upgrading to Unraid OS 6.10 you may delete those files, or leave them as-is.  This change was made to greatly improve the Desktop GUI experience for new users.

     

    Added support for Intel GVT-g, which lets you split your Intel i915 iGPU into multiple virtual GPUs and pass them through to multiple VMs, using @ich777's Intel-GVT-g plugin.

     

    Added support for gnif/vendor-reset.  This simplifies @ich777's AMD Vendor Reset plugin which permits users to get their AMD video cards to reset properly.

     

    [rc2] Added so-called "add-relaxable-rmrr-5_8_and_up.patch" modified for our kernel
      https://github.com/kiler129/relax-intel-rmrr/blob/master/patches/add-relaxable-rmrr-5_8_and_up.patch

    Thanks to @ich777 for pointing this out.

     

    [rc2] Enabled additional ACPI kernel options
    [rc2] Enabled TPM kernel modules (not utilized yet) - note this is for Unraid host utilizing physical TPM, not emulated TPM support for virtual machnes.

    [rc4] Updated out-of-tree drivers

    [rc5] Support Realtek RTL8152/RTL8153 Based USB Ethernet Adapters

     

    Base Packages

    Virtually the entire base package set has been updated.

     

    [rc2] For SMB: Samba version 4.15 SMB3 multi-channel is no longer marked "experimental", however is disabled by default.  This may be enabled on the Settings/SMB Settings page.  Some users have reported issues with SMB3 multi-channel in conjunction with certain network bond configurations.

     

    [rc2] Per request we added the mcelog package.  With inclusion of this package, if you have an AMD processor you may see this error message in the system log:

    mcelog: ERROR: AMD Processor family 23: mcelog does not support this processor. Please use the edac_mce_amd module instead.

    We're not sure what to make of this.  It appears mcelog is being deprecated in favor of rasdaemon.  This is something we need to research further.

     

    Other improvements available in 6.10, which are maybe not so obvious to spot from the release notes and some of these improvements are internal and not really visible:

     

    Event driven model to obtain server information and update the webGUI in real-time

    • The advantage of this model is its scalability. Multiple browsers can be opened simultaneously to the webGUI without much impact
    • In addition stale browser sessions won't create any CSRF errors anymore
    • People who keep their browser open 24/7 will find the webGUI stays responsive at all times
    • [rc3] Consistent state information is maintained across all browser instances open to a particular server

     

    Docker labels

    • Docker labels are added to allow people using Docker compose to make use of icons and GUI access
    • Look at a Docker 'run' command output to see exactly what labels are used

     

    Docker custom networks

    • A new setting for custom networks is available. Originally custom networks are created using the macvlan mode, and this mode is kept when upgrading to version 6.10
    • The new ipvlan mode is introduced to battle the crashes some people experience when using macvlan mode. If that is your case, change to ipvlan mode and test. Changing of mode does not require to reconfigure anything on Docker level, internally everything is being taken care off.

     

    Docker bridge network (docker0)

    • docker0 now supports IPv6. This is implemented by assigning docker0 a private IPv6 subnet (fd17::/64), similar to what is done for IPv4 and use network translation to communicate with the outside world
    • Containers connected to the bridge network now have both IPv4 and IPv6 connectivity (of course the system must have IPv6 configured in the network configuration)
    • In addition several enhancements are made in the IPv6 implementation to better deal with the use (or no-use) of IPv6

     

    Plugins page

    • The plugins page now loads information in two steps. First the list of plugins is created and next the more time consuming plugin status field is retrieved in the background. The result is a faster loading plugins page, especially when you have a lot of plugins installed

     

    Dashboard graphs

    • The dashboard has now two graphs available. The CPU graph is displayed by default, while the NETWORK graph is a new option under Interface (see the 'General Info' selection)
    • The CPU graph may be hidden as well in case it is not desired
    • Both graphs have a configurable time-line, which is by default 30 seconds and can be changed independently for each graph to see a longer or shorter history.
    • Graphs are updated in real-time and are useful to observe the behavior of the server under different circumstances

     

    Scheduler Improvements

    • [rc3] You can now split a parity check into smaller pieces and let it run over multiple days or weeks.  For example a check can be performed in a time frame of 01:00am to 06:00am for several days in a row until it is completed.  This way a long parity check won’t interfere with the normal day activities, like watching a movie.
    • [rc3] Added ability to schedule pool 'balance' and 'scrub' operations and calculate whether a full balance is recommended.

     

    Other Changes

    • We switched to a better-maintained version of the WSD server component called wsdd2 in an effort to eliminate instances where the wsd daemon would start consuming 100% of a CPU core.
    • Fixed issue where you couldn't create a docker image on a share name that contains a space.
    • Fixed issue where 'mover' would not move to a pool name that contains a space.
    • Fixed issue in User Share file system where permissions were not being honored.
    • We increased the font size in Terminal and [rc2] fixed issue with macOS Monterey.  Terminal font size is configurable via Settings/Display Settings page.
    • [rc2] Fixed jumbo frames not working.
    • [rc2] sysctl: handle net.netfilter.nf_conntrack_count max exceeded (increase setting to 131072) - hattip to Community Member @DieFalse

    • [rc2] Mover will create '.partial' file and then rename upon completion.

    • [rc2] Enabled NFSv4 support.

    • [rc2] Check bz file sha256sums at boot time.

    • [rc3] Fixed bug found by @thohell where md_sync_limit was not being honored to limit stripe_head cache usage when other I/O is active.  The effect of this fix is to drastically slow down parity operations if other I/O is happening (such as streaming a video).  Throttling of parity sync operations can be adjusted by changing the 'Settings/Disk Settings/Tunable (md_sync_limit)' value.

    • [rc3] Fixed btrfs pool device replace corner cases.  Important note: if you 'unassign' a device from a btrfs multiple-device pool, and that device is still physically present, upon array Start we will erase the LUKS header on the device if present, and delete the partition structure, thereby effectively erasing all the data contained on the device.  This is necessary in order to convince btrfs to no longer use the device and to free it for assignment to another pool.

    • [rc3] For cookies managed by webGUI, changed sameSite cookie attribute from 'strict' to 'lax'.  This change was made to solve an issue with Terminal window not opening in Safari.

    • [rc5] Fixed a bug where replacing a device in a multiple-device btrfs pool would still tag the old device as missing.

    • [rc5] Fixed an issue where hot plugging a device in a server with spun-down SAS drive(s) could cause the SAS drive(s) to appear unassigned.

    • [rc5] Fixed an issue where the server would disappear from Windows Network after docker and/or VM startup.

    • [rc5] Fixed md/unraid driver regression which would confuse XFS, making it think an online shrink had occurred.

    • [rc5] Fixed: Prevent Unraid from hanging when the array is stopped, while VMs are in paused or suspended state.

    • Numerous other small bug fixes and improvements.

     

    Credits

    Special thanks to all our beta testers and especially:

    @bonienl for his continued refinement and updating of the Dynamix webGUI.

    @Squid for continued refinement of Community Apps and associated feed.

    @dlandon for continued refinement of Unassigned Devices plugin and patience as we change things under the hood.

    @ich777 for assistance and passing on knowledge of Linux kernel config changes to support third party drivers and other kernel-related functionality via plugins.

    @SimonF for refinements to System Devices page and other webGUI improvements.

    @thohell for an extra set of eyes looking at md/unraid driver and for work-in-progress of adding changes to support multiple Unraid arrays.

     


    Version 6.10.0-rc5 2022-04-26 (vs. 6.10.0-rc4)

    Base distro:

    • at: version 3.2.3
    • bind: version 9.16.27
    • btrfs-progs: version 5.16
    • ca-certificates: version 20220403
    • ethtool: version 5.16
    • eudev: version 3.2.11
    • git: version 2.35.3-x86_64-1 (CVE-2022-24765)
    • glib2: version 2.70.3
    • glibc-zoneinfo: version 2022a
    • gzip: version 1.12-x86_64-1 (CVE-2022-1271)
    • haveged: [removed]
    • hdparm: version 9.63
    • iproute2: version 5.16.0
    • libarchive: version 3.6.1-x86_64-1
    • libgpg-error: version 1.44
    • libunwind: version 1.6.2
    • libwebp: version 1.2.2
    • libxml2: version 2.9.13
    • libxslt: version 1.1.35
    • openssl: version 1.1.1n
    • openssl-solibs: version 1.1.1n
    • p11-kit: version 0.24.1
    • pango: version 1.48.11
    • sudo: version 1.9.9
    • tdb: version 1.4.6
    • util-linux: version 2.37.4
    • wsdd2: version 20111022 build 2
    • xz: version 5.2.5-x86_64-4 (CVE-2022-1271)
    • zlib: version 1.2.12
    • zstd: version 1.5.2

    Linux kernel:

    • Linux 5.15.35-Unraid
    • added CONFIG_USB_RTL8152: Realtek RTL8152/RTL8153 Based USB Ethernet Adapters

    Management:

    • emhttpd: fix btrfs pool device replace still showing 'missing'
    • rc.docker: fix startup network race condition
    • rc.libvirt: Prevent Unraid from hanging when the array is stopped, while VMs are in paused or suspended state
    • rc.nginx: read IP address from management interfact (eth0) only
    • rc.samba: disable SMB Multi Channel by default; add control to Settings/SMB Settings page
    • ttyd: fix garbled text in local FireFox Termainl windows
    • upc: refactor(upc):base-6.10 remove sign in requirement
    • webgui: improve: Highlight selected row when hovering over array or shares
    • webgui: Right-clicking or long-clicking a menu item should open the selected menu
    • webgui: Make links in help text standout (red)
    • webgui: Update Outlook/Hotmail smtp settings
    • webgui: UpdateDNS to prefer IPv4 first and then IPv6
    • webgui: Allow simultaneous log and console windows for containers
    • webgui: Fixed: missing samesite attribute in cookies
    • webgui: WireGuard: user nginx settings and unraid.net api
    • webgui: Parity: shown duration time excluding idle time
    • webgui: Miscellaneous updates and fixes
    • webgui: fix: password lockouts not being cleared properly
    • webgui: Support future T2FA
    • webgui: Expand file type icon selection
    • webgui: Show IP on VM Manager VM Page
    • webgui: Docker: Silence PHP errors when editing a template if corruption exists
    • webgui: Fixed PHP errors for share and disk calculations
    • webgui: Main page - lower table update frequency for better responsiveness of links
    • webgui: Change page switching to better suit Safari on mobile devices
    • webgui: Set Main page update frequency to 1s for better support of mobile devices
    • webgui: Docker settings: suppress browser presets
    • webgui: Lower update frequency of monitor function to better suit mobile devices
    • webgui: Docker: fixed list display in fixed view mode
    • webgui: Docker: fixed header display causes gap
    • webgui: WireGuard updates:
      1. Make import config file of VPN providers more robust.
      2. Add tunnel routing for docker containers
      3. Automatically make the WG tunnel available to containers (custom network)
    • webgui: WireGuard: Introduce new network modes:
      1. VPN tunneled access for system
      2. VPN tunneled access for docker
    • webgui: WireGuard: Add warning when tunnel deletion fails
    • webgui: WireGuard: use kill switch when tunnel inactive
    • webgui: Docker: add route for remote WireGuard access
      • Containers with network 'br0' can be remotely accessed by WireGuard without the need to configure static routes on the home router (gateway)
      • "Host access to custom networks" must be enabled to allow access
    • webgui: WireGuard: add logic to recreate networks after reboot
    • webgui: Docker: add route for remote WireGuard access
    • webgui: Wireguard: make management interface seletable
      • Defaults to eth0 - future expansion
    • webgui: Docker: add wireguard description in network selection
    • webgui: diagnostics: fix: anonymize myunraid.net urls
    • webgui: BTRFS balance: fix recommendation message when volume is empty
    • webgui: Log docker icon download failures
    • webgui: Docker: add description to all custom networks
    • webgui: Management: fix ports in use check
    • webgui: Fixed: specific disk settings for pool devices only
    • Like 13
    • Thanks 5
    • Upvote 2



    User Feedback

    Recommended Comments



    @bonienl I have not done anything to the system other than swap a drive in the last two days. This NIC setting has never had a gateway, intentionally. 

     

    1390886095_2022-04-2909_53_17-Window.thumb.png.24352a14139123df028454df93ff5b91.png

    Link to comment
    1 hour ago, Tyranian said:

    I upgraded from stable 6.9.2 and I am experiencing a lot of permission issues with Dockers is this expected?

     

    No.  If problems continue, create a new support thread with your diagnostics

    Link to comment
    48 minutes ago, Squid said:

    No.  If problems continue, create a new support thread with your diagnostics

    I resolved with reinstall of Dockers and restoring config / data, and posted in the Docker specific support as all were from one repository

    • Like 1
    Link to comment
    10 hours ago, omygoodness said:

    @feraay Yep. If you need any help just let me know. 


    just wondering so you are the only person on the planet alder lake igpu works for Plex transcoding with an 5.15 kernel.

     

    may you can explain your steps here:

     or here:

     

    https://forums.unraid.net/bug-reports/prereleases/69x-610x-intel-i915-module-causing-system-hangs-with-no-report-in-syslog-r1674/page/4/?tab=comments#comment-18072

     

     

    how did you managed to get alder lake igpu driver support with Kernel 5.15? 
     

    thanks. 

     

    Edited by feraay
    Link to comment
    On 4/27/2022 at 1:30 PM, eagle470 said:

    Also the web UI no longer auto redirects from the IP address to the DNS address.

     

    On 4/27/2022 at 1:35 PM, limetech said:

    That's by design.

     

    On 4/27/2022 at 1:44 PM, eagle470 said:

    I have to say I'm disappointed in the lack of the auto redirect.

     

    To go into more detail... the exact behavior depends on the value of "Use SSL/TLS" from Settings -> Management Access. Assuming you have provisioned a myunraid.net certificate, then:

     

    • If "Use SSL" is set to Auto, then you WILL get the redirect from http://ipaddress to https://ip.hash.myunraid.net However, this behavior makes it more difficult to access your server when DNS is unavailable (i.e. your Internet goes down). If that happens see https://wiki.unraid.net/My_Servers#How_to_access_your_server_when_DNS_is_down
    • When "Use SSL" is set to Yes, then http://ipaddress redirects to https://[servername].[localTLD] as that will likely work even if your Internet goes down.
    • When "Use SSL" is set to No, then http://ipaddress loads directly.

     

    (Note the very careful use of "http" vs "https" in the text above)

     

    Personally, I prefer the "Auto" setting as my Internet is pretty stable.

     

    For more details on your particular server, download your diagnostics.zip file (from Tools -> Diagnostics) and open it up, then take a look at system\urls.txt

    • Thanks 1
    Link to comment

    Has rc4/5 changed the behaviour of ctrl+clicking the unraid tabs? Seems like now on all browsers I use (windows chrome, mac firefox/safari), it opens the target link in a new tab (as it should), but the original tab also navigates to that link (as opposed to staying on the same tab).

    Link to comment
    2 hours ago, fat_flying_pigs said:

    Has rc4/5 changed the behaviour of ctrl+clicking the unraid tabs? Seems like now on all browsers I use (windows chrome, mac firefox/safari), it opens the target link in a new tab (as it should), but the original tab also navigates to that link (as opposed to staying on the same tab).

    Looks like the onclick behaviour has been changed slightly, looks like its trying to manage cookies better when navigating links, but maybe browser security setting aren't liking it?

     

    My popup blocker stops ctrl+clicks for those links, even though the unraid ui is greenlit in adblocker

    Edited by tjb_altf4
    Link to comment

    Really looked good, but I had to rollback because a few dockers (namely Plex) refused to run after upgrading. Didn't have time to troubleshoot.  

    Link to comment

    "webgui: improve: Highlight selected row when hovering over array or shares" - Can we please get an option to disable this? It´s really annoying

    Link to comment

    Opening the link to view the content of a disk became better, but finally the bug is still present (this shows the most worst example, most of the time I was successful):

     

     

     

    It seems, you reduced the interval of rebuilding the dashboard content. Why do you rebuild the full content at all? Wouldn't it be better to update only those data which has really changed, like for example the temperature of a disk or the disk usage? By that the link itself wouldn't rebuild all the time. Or you update it only after the AJAX call received new data. By that it would reduce the chance to "click at the wrong moment" much more.

    Link to comment

    I had an issue, which I eventually resolved. Gonna post it here because I'm unsure if it is/isn't related to rc4/rc5.

    In 6.9, using the web-terminal, I borked my usb drive by running a recursive "mv /*" command. I managed to pull my data from the drive afterward, installed a fresh rc4 on the usb, then copied over a folder (I think it was /config). Most everything worked correctly after. However using a wireguard connection from my phone/laptop would not allow a connection to a docker br0 (specifically adguard-home webui or adguard port 53); it connected to bridge/host/proxynet just fine. After attempting a great number of things, I switched all three of the below options in my docker settings, then toggled back. It worked after.image.png.c00a33073bb9e703bbba4689e9131332.png

     

    Is there a chance that the above 3 settings could be represented incorrectly? Or that toggling off them then back to them would fix the docker network configuration?

    • Like 1
    Link to comment
    On 4/27/2022 at 1:44 AM, S80_UK said:

    After updating got a shock when one of my array drives showed as orange on the main tab.

    Took a second before I realized my cursor just happened to be hovering there and it was highlighted. 😁

    I really like it but may take a little time to get used to it.

     

    This!! @bonienl can you please change the colour to anything other than orange or red please?! 😄 The heart sank when i saw an orange drive after i'd physically cleaned the dust out my server and turned it back on to check everything was all ok.

     

    Perhaps a different shade of green? enough to notice the difference when moving your mouse, but not something we've been programmed to fear after many years of traffic light colours.

     

    other than that, update went smoothly ☺️

    Edited by Ockingshay
    Link to comment
    10 minutes ago, Ockingshay said:

     

    This!! @bonienl can you please change the colour to anything other than orange or red please?! 😄 The heart sank when i saw an orange drive after i'd physically cleaned the dust out my server and turned it back on to check everything was all ok.

     

    Perhaps a different shade of green? enough to notice the difference when moving your mouse, but not something we've been programmed to fear after many years of traffic light colours.

     

    other than that, update went smoothly ☺️

    This is already updated for the next release to highlight line rather than change colour.

    • Thanks 1
    • Upvote 2
    Link to comment

    Since 6.10.0 RC4, I see that the font used for the drive identification is different than before.

     

    image.png.3726fc1f8fce0c67b1f73279b25432a4.png

     

    It was already the case before, but I don't like the new font. :/ 

    The difference was more subtle in 6.9.

    image.png.2454effd5999bd0fcf03163af2486eb0.png

    • Like 1
    Link to comment
    4 hours ago, ChatNoir said:

    Since 6.10.0 RC4, I see that the font used for the drive identification is different than before.

     

    image.png.3726fc1f8fce0c67b1f73279b25432a4.png

     

    It was already the case before, but I don't like the new font. :/ 

    The difference was more subtle in 6.9.

    image.png.2454effd5999bd0fcf03163af2486eb0.png

    Totally agree with you ChatNoir, The old font is much better. Maybe we could have a choice to choose a custom GUI font in a future release?

    Link to comment

    The original font was changed because this font doesn't support all the different languages, specifically Cyrillic.

    Since the introduction of multi-language support, the fonts must support the different languages we have added to Unraid.

     

    You can make a feature request for a future font improvement (needs research).

     

    • Like 1
    • Upvote 1
    Link to comment
    On 4/29/2022 at 4:34 PM, ljm42 said:

     

     

     

    To go into more detail... the exact behavior depends on the value of "Use SSL/TLS" from Settings -> Management Access. Assuming you have provisioned a myunraid.net certificate, then:

     

    • If "Use SSL" is set to Auto, then you WILL get the redirect from http://ipaddress to https://ip.hash.myunraid.net However, this behavior makes it more difficult to access your server when DNS is unavailable (i.e. your Internet goes down). If that happens see https://wiki.unraid.net/My_Servers#How_to_access_your_server_when_DNS_is_down
    • When "Use SSL" is set to Yes, then http://ipaddress redirects to https://[servername].[localTLD] as that will likely work even if your Internet goes down.
    • When "Use SSL" is set to No, then http://ipaddress loads directly.

     

    (Note the very careful use of "http" vs "https" in the text above)

     

    Personally, I prefer the "Auto" setting as my Internet is pretty stable.

     

    For more details on your particular server, download your diagnostics.zip file (from Tools -> Diagnostics) and open it up, then take a look at system\urls.txt

     

    Ill note that if you want to place unraid behind a load balance/reverse proxy and handle ssl termination yourself, you need to set "Use SSL" to No and you will be all set. Auto isn't really that great as what's the point of a local server if you need to reach out to the internet to use it? Doesn't make sense imho. Use SSL Yes might make sense if you don't have a local domain you are already using but really screws that up if you do, so just be aware, if you want to use this as "unraid.localsite.net or whatnot internally you need to turn off SSL on the unpaid side to get it to redirect properly. 

    Edited by Jclendineng
    Link to comment

    > Auto isn't really that great as what's the point of a local server if you need to reach out to the internet to use it?

     

    Not all LAN's are trusted.  For example, schools, some small business, homes with teenage hackers, etc...

    Link to comment
    On 5/2/2022 at 4:19 PM, bonienl said:

    The original font was changed because this font doesn't support all the different languages, specifically Cyrillic.

    Since the introduction of multi-language support, the fonts must support the different languages we have added to Unraid.

     

    You can make a feature request for a future font improvement (needs research).

     

    Thank you Bonienl, where may we ask for a feature request?

    Link to comment
    On 5/2/2022 at 5:00 PM, ChatNoir said:

    Since 6.10.0 RC4, I see that the font used for the drive identification is different than before.

     

    image.png.3726fc1f8fce0c67b1f73279b25432a4.png

     

    It was already the case before, but I don't like the new font. :/ 

    The difference was more subtle in 6.9.

    image.png.2454effd5999bd0fcf03163af2486eb0.png

     

    I went on a font quest and found Droid Sans Mono, a font made by Google for Android.

    It looks very crisp and easy to read. It supports many languages as well.

     

    image.thumb.png.40a695fabc05ed08f76cad16a30718d9.png

    • Like 2
    Link to comment
    Frank1940

    Posted (edited)

    3 hours ago, bonienl said:

     

    I went on a font quest and found Droid Sans Mono, a font made by Google for Android.

    It looks very crisp and easy to read. It supports many languages as well.

     

    image.thumb.png.40a695fabc05ed08f76cad16a30718d9.png

    Not a real fan of this font as it does not appear that there is NOT an obvious difference between 0(number) and O(letter).  (Of course, this font has the same problem...)  This is a problem for a font being used for tables where the it is not obvious from the context which which is which.

    Edited by Frank1940
    • Thanks 1
    Link to comment
    1 hour ago, Frank1940 said:

    Not a real fan of this font as it does not appear that there is NOT an obvious difference between 0(number) and O(letter). 

     

    There is a difference, see picture below, the letter 'O' is more open than the digit '0'

     

    image.png.d5b1f70584889d2832bfcdf121761d35.pngimage.png.100a1bda4277f972d71de50254aa1144.png

     

    image.thumb.png.206e5fb6348bd1cd6bf7a223bbbe722a.png

    Link to comment
    16 minutes ago, bonienl said:

     

    There is a difference, see picture below, the letter 'O' is more open than the digit '0'

     

    image.png.d5b1f70584889d2832bfcdf121761d35.pngimage.png.100a1bda4277f972d71de50254aa1144.png

     

     

     

    Only when you have both present to compare.  Otherwise, you are left in a guessing situation.  With some fonts, "I" and "1" have a similiar situation.  Another combination to check out is "I"(capital "i") and"l"(small "L").  This combination is an issue with most fonts.  

     

    As an aside, the password manager, Bitwarden, has an option to generate random passwords which will not use letters and numbers that are often confused with some other character to prevent this type of problem.

    • Thanks 1
    Link to comment



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Restore formatting

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Status Definitions

     

    Open = Under consideration.

     

    Solved = The issue has been resolved.

     

    Solved version = The issue has been resolved in the indicated release version.

     

    Closed = Feedback or opinion better posted on our forum for discussion. Also for reports we cannot reproduce or need more information. In this case just add a comment and we will review it again.

     

    Retest = Please retest in latest release.


    Priority Definitions

     

    Minor = Something not working correctly.

     

    Urgent = Server crash, data loss, or other showstopper.

     

    Annoyance = Doesn't affect functionality but should be fixed.

     

    Other = Announcement or other non-issue.