Leaderboard

Popular Content

Showing content with the highest reputation on 08/28/20 in Posts

  1. I code for fun and my dockers are mostly about adding niche features to stuff. DockerHub: https://hub.docker.com/u/testdasi If you like my work, a donation to my burger fund is very much appreciated. List: Grafana Unraid Stack OpenVPN HyRoSa OpenVPN HyDeSa OpenVPN AIO Client Pi-Hole DoT DoH DNS DoH companion Grafana Unraid Stack Meet Gus! He has everything you need to start monitoring Unraid (Grafana - Influxdb - Telegraf - Loki - Promtail). Comes with GUS dashboard and falconexe's Ultimate UNRAID Dashboard v1.3 pre-installed. Choice of HDDTemp or S.M.A.R.T for HDD/SSD monitoring. (Hint: both GUS and UUD use S.M.A.R.T) Ability to view Unraid syslog in a Grafana panel with Loki and Promtail. NOTE: uses Host network by default. If you want to run at with Bridge network, remember to map port 3006 to access Grafana. Don't change the port ENV variables unless you are comfortable changing the various config files as things are very tightly integrated. For more detailed instructions, please refer to Docker Hub / Github links below. Docker Hub: https://hub.docker.com/r/testdasi/grafana-unraid-stack Github: https://github.com/testdasi/grafana-unraid-stack Ultimate UNRAID Dashboard official thread: https://forums.unraid.net/topic/96895-ultimate-unraid-dashboard-uud/ OpenVPN HyRoSa (NZB)Hydra2 - RTorrent (Flood GUI) - Sabnzbd. Same as OpenVPN HyDeSa except with rTorrent instead of Deluge. I personally prefer rTorrent + Flood over the alternatives. Port-forwarding is unfortunately not supported at the moment (and it also requires your VPN service to provide a way to do it). Torrent still works fine without port-forwarding but if it's critical to you, I recommend binhex/arch-rtorrentvpn. NOTE: You must create an openvpn subfolder under your appdata folder and place the OpenVPN configuration there (must include openvpn.ovpn + credentials + certs). For more detailed instructions, please refer to Docker Hub / Github links below. Docker Hub: https://hub.docker.com/r/testdasi/openvpn-hyrosa Github: https://github.com/testdasi/openvpn-hyrosa OpenVPN HyDeSa (NZB)Hydra2 - Deluge - Sabnzbd. Now your torrent and usenet are protected behind OpenVPN Client (with kill switch) and DNS-over-TLS. Socks5 + HTTP proxy are also included for your convenience e.g. to also send Sonarr and Radarr web traffic through the VPN. Port-forwarding is unfortunately not supported at the moment (and it also requires your VPN service to provide a way to do it). Torrent still works fine without port-forwarding but if it's critical to you, I recommend binhex/arch-delugevpn. NOTE: You must create an openvpn subfolder under your appdata folder and place the OpenVPN configuration there (must include openvpn.ovpn + credentials + certs). For more detailed instructions, please refer to Docker Hub / Github links below. Docker Hub: https://hub.docker.com/r/testdasi/openvpn-hydesa Github: https://github.com/testdasi/openvpn-hydesa OpenVPN AIO Client An "all-in-one" docker for all your private browsing needs. Including OpenVPN client with nftables kill switch DNS server to DoT (DNS-over-TLS) services Socks5 + HTTP proxy to both VPN and TOR with (additional) piping kill switch for the proxies. Default repository with VPN + TOR: testdasi/openvpn-client-aio:stable-amd64 Optional repository with only VPN: testdasi/openvpn-client-aio:stable-torless-amd64 NOTE: you must place your own OpenVPN configuration to the host path that is mapped to /etc/openvpn (The ovpn file must be named openvpn.ovpn. Credentials + certs can be in the same file or split out into other files - the flexibility is yours.) For more detailed instructions, please refer to Docker Hub / Github links below. Docker Hub: https://hub.docker.com/r/testdasi/openvpn-client-aio Github: https://github.com/testdasi/openvpn-client-aio Pi-Hole DoT DoH Official pihole docker with added DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH). DoH uses cloudflare (1.1.1.1/1.0.0.1) and DoT uses google (8.8.8.8/8.8.4.4). Config files are exposed so you can modify them as you wish e.g. to add more services. This docker supercedes my previous Pi-Hole with DoH and Pi-Hole with DoT dockers. For more detailed instructions, please refer to Docker Hub / Github links below. Docker Hub: https://hub.docker.com/r/testdasi/pihole-dot-doh Github: https://github.com/testdasi/pihole-dot-doh DNS DoH companion Simple DNS server to connect to DNS-over-HTTPS. Easy fast way to add DNS functionality to an OpenVPN docker (using --network=container:) and/or enable DNS encryption for your local network / devices. Emphasis on simplicity (hence a "companion"). If you want bells and whistles, I recommend ICH777's DoH Client. Update (23/09/2020): Grafana Unraid Stack changes: Expose Influxdb RPC port and change it to a rarer default value (58083) instead of the original common 8088. Added falconexe's Ultimate UNRAID Dashboard v1.3
    3 points
  2. I have the Rx 570 passed through. Had to install drivers through device management window as everytime I installed via .exe it would lock up, black screen. Don't force shutdown as if it's like mine the gpu won't restart and you would have to restart server.. may help, may not, hope so
    2 points
  3. I have been out for a long time from the devolopments of Unraid... Last time I was more active there was this thing called a "movie jukebox" (YAMJ/Eversion) that you could also customize yourself to a certain decree. But now all I see is Plex. Is it really the only way to make an easy UI for movies?
    1 point
  4. got kids?, then you need them to read this 🙂 https://ia902600.us.archive.org/15/items/mommybook/mommybook.pdf
    1 point
  5. Rebuilding a failed drive uses the parity data with the data from all the other drives to calculate the data to rebuild the failed drive. New Config enables all disks again and rebuilds parity based on all the disks in the array. If a disk is missing, the parity rebuild will not include that disk. And if the disk is not missing but is returning bad data, that bad data will be part of the parity rebuild. So, after New Config rebuilds parity, anything that parity had before that would have allowed a failed or missing disk to be rebuilt is no longer there. Invalidslot makes New Config rebuild a specified data disk instead of rebuilding parity.
    1 point
  6. I talked to the help Discord briefly. They seemed to think the Docker image is pretty out of date & initially recommended going Unraid > VM > Shinobi instead of Docker. I was able to get it working, though... I followed the update instructions on the Shinobi site (running the commands from the Docker console): https://hub.shinobi.video/articles/view/LTVqL3I8f8kIzsX I couldn't restart from the console, but restarting from the Unraid UI after running the update commands worked - everything came right back up. More importantly it seems to have solved the original issue - I am able to save presets/etc. Thanks again for the help!
    1 point
  7. @testdasi Thanks for the docker, just tried and it worked great.
    1 point
  8. 1 point
  9. Don't know if this is related: Aug 26 18:50:02 Acu-Tower vsftpd[25980]: connect from 184.105.139.70 (184.105.139.70) Aug 26 19:42:34 Acu-Tower vsftpd[7115]: connect from 170.130.187.58 (170.130.187.58) Aug 26 20:00:51 Acu-Tower vsftpd[23429]: connect from 192.241.227.131 (192.241.227.131) ... Aug 26 22:18:44 Acu-Tower vsftpd[16593]: connect from 104.152.52.34 (104.152.52.34) ... Aug 27 01:51:23 Acu-Tower vsftpd[16342]: connect from 91.241.19.109 (91.241.19.109) https://www.abuseipdb.com/check/184.105.139.70 https://www.abuseipdb.com/check/170.130.187.58 https://www.abuseipdb.com/check/192.241.227.131 https://www.abuseipdb.com/check/104.152.52.34 https://www.abuseipdb.com/check/91.241.19.109 And lots more like that.
    1 point
  10. And the support issues will be exponentially expanded through the roof as every card seems to require its own driver and has its own set of quirks.
    1 point
  11. Bom dia, @agarkauskas Esse assunto também me interessa, mas... Meu cabeamento Ethernet aqui em casa é todo cat-5E. Além disso, é todo embutido no teto (numa droga de eletrocalha metálica que não sei como concordei em instalar, para dizer a verdade...) e nas paredes (saindo da eletrocalha do teto, vai para conduítes separados para cada ponto). Por essa razão, para trocar o cabeamento, para cat6a ou 7, teria que quebrar o teto de gesso e não estou a fim de fazer reforma, pq é muito transtorno, sujeira e a patroa não vai entender de jeito nenhum a diferença... Sendo assim, o único jeito é limitar a rede 10GB ao escritório entre o Unraid e uns poucos equipamentos que venham a ser conectados num switch 10Gb que ainda nem comecei a procurar. Como vc pensa em fazer aí no seu caso?
    1 point
  12. Use GUI mode boot and change it in the settings. Or alternatively, use a spare router set to the old network range then connect the Unraid and your computer to the spare router then change it.
    1 point
  13. You need to change the Tunnel view from „Basic“ to „Advanced“. The toggle is located Between the „Active“ and „Autostart“ toggle in the top Right corner of the Tunnel. After that you will find the Delete Tunnel button in the Bottom Right corner of the Tunnel configuration.
    1 point
  14. Mount the RFS drives using the Unassigned Devices plugin. Then copy the contents of the disk(s) to the array. For the copy process, you could use the Krusader Docker (GUI file manager) or the built-in mc file manager (mc is a semi-graphic file manager that you start by typing mc at a command line prompt). You could use the command line rsync command. (This is only for those who are really into command line usage.) By the way, I would use copy and not move. That way, you have a backup in case of any problems in the near future. (If you have a backup copy, you will probably never need it... 😈 )
    1 point
  15. I'll add latest git zfs in the next version.... probably today release... 5.8.5 as for buildscript.... why do you need one there just some easy commands to build kernel copy current config to .config then make -j$(nproc) then make INSTALL_MOD_PATH=../modules modules_install to extract modules to a separate directory then mksquashfs modules/lib/modules/*/ bzmodules -keep-as-directory -noappend -root-owned -no-xattrs makes the bzmodules and bzimage is in arch/x86/boot/ this is all run on a linux system not on unraid itself.... but my advice if you are not familiar with kernel building and configuration to not do it and do some research first, you can get some funky results... your choice
    1 point
  16. Mesmo user que vc definir nos Users do Unraid. Esse usuário e senha vc deverá usar no Mac para acessar o compartilhamento. Se tudo estiver certo, terá então capacidade de leitura e escrita. Cuidado com a pegadinha na hora de clicar em Connect nas configurações do Time Machine, conforme explicado num dos vídeos que vc compartilhou. Essa pegadinha eu já conhecia, desde outros testes que fiz com outros sistemas, mas tinha me esquecido e o vídeo me re-lembrou. Obrigado por ter compartilhado!
    1 point
  17. Another alternative is using MOCA Adapters, bonded 2.5 preferably, if you have coax runs in your building. They work exceptionally well.
    1 point
  18. Hello, Thanks for this docker. I was using the original pi-hole without DOH support. I would like to use this but after installing, I can see the pi-hole resolving the websites in the query log but I can't browse the websites, get an error that cannot resolve dns name. I left the DNS1 and DNS2 as instructed to 127.1.1.1#5153, if I select any of the other upstream servers such as Cloudflare or Quad9, then I can browse the internet. Am I suppose to choose another Upstream server along with the 2 custom 127.1.1.1#5153? Thanks
    1 point
  19. Hmm what if you try the update command without changing database to mysql (also oops the command I gave was wrong)
    1 point
  20. You're looking at the openeats database, you need to open the "mysql" database in adminer, or open a console in the mariadb docker. I haven't used adminer really, but if you open a mariadb docker console You can login using mysql -u root -p [type in root password you set in the container] USE DATABASE mysql; You then have to run: UPDATE mysql.user SET Host='%' WHERE User='openeats'; FLUSH PRIVILEGES;
    1 point
  21. Fair enough. In light of that, I have added TWO options... None of the above (as requested), and "Other". Does that tune your guitar strings? 🙂
    1 point
  22. When you log into the db with Adminer, what is the host for the openeats (or if you renamed it) user in the mysql.user table? It should be 'openeats'@'something', where you need to replace the something with either '%' or the docker ip of your openeats container (172.18.0.5:80 for me) Example: These are my users, I called mine "rob"
    1 point
  23. No. You're mixing things up a little bit again. The VM itself is contained in one large file. That file can reside on the cache drive, on the array, wherever you want it. Think of it like a massive archive file (zip, rar, etc).. everything for the VM is inside that file and doesn't leave it, doesn't write to the array directly or anything. If you create a file inside the VM that file is saved within the VM file also, and doesn't touch the array outside of that VM "archive" file. So you can have the NVME acting as cache for the array, and have the VM "archive" on it, and the two don't mix. Nothing is directly written to the NVME from the VM except for the VM file itself. I think the above explanation addresses this, unless you mean something else. Sort of yes, sort of no. You can have a drive on it's own passed through to the VM and that's not tied directly to the array. I think that was mentioned already. You can have a drive mounted with Unassigned Devices that's not part of the array storage, but that is "connected" to the array as far as access is concerned. Malware that was able to "run" through the Unassigned Devices mount point would be able to access your entire array. The shares that you create in Unraid on the Shares tab. Each one of those shares can be directly accessed through SMB like \\unraid\Share1, \\unraid\Share2 \\unraid\MediaShare, etc... so let's say you had a downloads share, \\unraid\Downloads, and mapped that inside your VM to D:\Downloads, every other share (Share1, Share2, MediaShare, etc) would still be accessible and vulnerable to attack, even if it's not a mapped drive in the VM like the D:\Downloads (\\unraid\Downloads) is. Does that make sense?
    1 point
  24. Well done! Is ther an easy way to change the pi-hole hostname?
    1 point
  25. I would love to make my own custom website, but that would take quite some effort. I have updated the Docker container again, forgot to add the part in the startup script that changes your locale. Edit: There was an issue with CRLF line endings, the latest container should work now (works for me)
    1 point
  26. Currently i'm running the reverseproxy docker with duckDNS docker for updating my IP and it's working great. I can access both dockers on my 2 local unraid boxes through a duckdns domain that gets authenticated through Organizr 2FA. With Wireguard VPN Manager i can access my network through the "Remote tunneled access" if i need to access any of the unraid webUI's for any reason or anything else on my network. it also works as a VPN for my remote location where it looks like i am connecting from my home address. Now recently i decided i wanted to setup tunnels on my 2 local unraid boxes to route all of their traffic through my VPN provider but for now it does not seem to be possible. Firstly it seems like you can only use EITHER the remote tunneled access OR the VPN tunneled access, you cannot use them both at the same time so im either unable to access my local network from remote OR my local unraid box will not go through the VPN. Secondly it doesnt appear that i can use the reverseproxy when the "VPN tunneled access" is turned on because i would have to forward port 443 and 80 through my VPN provider which doesnt seem feasible. So i sort of have 2 questions. Is there a way to enable both "VPN tunneled access" AND "Remote tunneled access" at the same time? or a function that works similarly? Is there a way to use reverseproxy if the host is connected to a VPN that cannot forward ports?
    1 point
  27. Not sure if you saw the answer on GitHub, but I would try to add the following under "location": error_log off; access_log off;
    1 point
  28. No, it's not, and again, this will only work if parity is valid, please follow the instructions below carefully and ask if there are any doubts. -Tools -> New Config -> Retain current configuration: All -> Apply -Check all assignments and assign any missing disk(s) if needed, including new disk3 -Important - After checking the assignments leave the browser on that page, the "Main" page. -Open an SSH session/use the console and type (don't copy/paste directly from the forum, as sometimes it can insert extra characters): mdcmd set invalidslot 3 29 -Back on the GUI and without refreshing the page, just start the array, do not check the "parity is already valid" box (GUI will still show that data on parity disk(s) will be overwritten, this is normal as it doesn't account for the invalid slot command, but they won't be as long as the procedure was correctly done), disk3 will start rebuilding, disk should mount immediately but if it's unmountable don't format, wait for the rebuild to finish and then run a filesystem check
    1 point
  29. Try this: https://forums.unraid.net/topic/46802-faq-for-unraid-v6/?do=findComment&comment=781601
    1 point
  30. Because LT has a small team and other features are way higher on the priority list. You will have to out-scream the [Include graphics card driver] crowd, the [Include Wifi] crowd and the [ZFS] crowd.
    1 point
  31. I'm currently searching for some users that help test my custom build with iSCSI built into Unraid (v6.9.0 beta25). EDIT: Also made a build for Unraid v6.8.3. Currently the creation of the iSCSI target is command line only (will write a plugin for that but for now it should also work this way - only a few commands in targetcli). The configuration is stored on the boot drive and loaded/unloaded with the array start/stop. If somebody is willing to test the build please contact me. As always I will release the complete source code and also implement it in my 'Unraid-Kernel-Helper Docker Container' so that everyone can build his own version with other features like nVdidia, ZFS, DVB also built in.
    1 point
  32. @DZMM If anybody is interested in testing a modified rclone build with a new upload tool. Feel free to grab the builds of my repository. You can run the builds side-by-side with stable rclone so you don't have to take down rclone for testing purposes! It should go without saying, but only run this if you are comfortable with rclone / DZMMs scripts and how they function. If not, you should stick on DZMMs scripts with rclone official build! Users of this modified build have reported upload speeds of ~1.4x faster than rclone and ~1.2-1.4x on downloads. I fully saturate my gig line on uploads with lclone where on stock rclone I typically got around 75-80% saturation. I've also got some example scripts for pulling from git, mounting, and uploading. Config files are already setup so you just have to edit them for your use case. The scripts aren't elegant but they get the job done. If you anybody likes it, I'll probably script it better to build from src as oppose to just pulling the pre-builds from my github. https://github.com/watchmeexplode5/lclone-crop-aio Feel free to use all or none of the stuff there. You can just run just the lclone build with DZMM's scripts if you want (make sure to edit the rclone config to include these new tags) drive_service_account_file_path = /folder/SAs (No trailing slash for service account file) service_account_file = /folder/SAs/any_sa.json All build credit goes to l3uddz who is a heavy contributor to rclone and cloudbox. You can follow his work on the cloudbox discord if you are interested -----Lclone (also called rclone_gclone) is a modified rclone build which rotates to a service accounts upon quota/api errors. This effectively not only removes the upload limit but also the download limit (even via mount command - solving plex/sonarr deep dive scan bans) and also a bunch of optimization features. -----Crop is a command line tool for uploading which utilizes rotating service accounts based once a limit has been hit. So it runs ever service account to it's limit before rotating. Not only that but you can have all your upload settings placed in a single config file (easy for those using lots of team drives). You can also setup the config to sync after upload so you can upload to one drive and server-side sync to all your other backup drives/servers with ease. For more info and options on crop/rclone_gclone config files check out: l3uddz Repository https://github.com/l3uddz?tab=repositories
    1 point
  33. Split levels can be confusing, let me give you 2 examples that should help, this is how 2 of my shares are set: (Share / Folder / Files) ps: share is also a folder, the top level one Movies / Movie Title / Movie and related files: split only the top level directory, all files from any movie will be on the same disk TV / Show Name / Season # / Episodes: split only the top two directory levels, all episodes from the same season will be on the same disk, different seasons of the same show can be on different disks, if you wanted all seasons to be on the same disk you'd need to set split level as the Movies share.
    1 point
  34. I can't guess who's older but let me just say ... BAH YOU YOUNG WHIPPER SNAPPERS!!! I remember when I had nothing but the green glow of a moving turtle to keep me warm at night!!! You with your fancy shmancy color monitors!!! Get off my lawn you fancy sshmancy CRT-using whipper snappers... oops my job is done, need to collect my punch cards.
    1 point
  35. I can't guess who's older but let me just say ... BAH YOU YOUNG WHIPPER SNAPPERS!!! I remember when I had nothing but the green glow of a moving turtle to keep me warm at night!!! You with your fancy shmancy color monitors!!!
    1 point