Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 01/17/19 in all areas

  1. 22 points
    Since I can remember Unraid has never been great at simultaneous array disk performance, but it was pretty acceptable, since v6.7 there have been various users complaining for example of very poor performance when running the mover and trying to stream a movie. I noticed this myself yesterday when I couldn't even start watching an SD video using Kodi just because there were writes going on to a different array disk, and this server doesn't even have a parity drive, so did a quick test on my test server and the problem is easily reproducible and started with the first v6.7 release candidate, rc1. How to reproduce: -Server just needs 2 assigned array data devices (no parity needed, but same happens with parity) and one cache device, no encryption, all devices are btrfs formatted -Used cp to copy a few video files from cache to disk2 -While cp is going on tried to stream a movie from disk1, took a long time to start and would keep stalling/buffering Tried to copy one file from disk1 (still while cp is going one on disk2), with V6.6.7: with v6.7rc1: A few times transfer will go higher for a couple of seconds but most times it's at a few KB/s or completely stalled. Also tried with all unencrypted xfs formatted devices and it was the same: Server where problem was detected and test server have no hardware in common, one is based on X11 Supermicro board, test server is X9 series, server using HDDs, test server using SSDs so very unlikely to be hardware related.
  2. 18 points
    tldr: If you require hardware support offered by the Linux 5.x kernel then I suggest you remain on 6.8.0-rc7 and wait until 6.9.0-rc1 is published before upgrading. The "unexpected GSO type" bug is looking to be a show stopper for Unraid 6.8 using Linux kernel 5.3 or 5.4 kernel. We can get it to happen easily and quickly simply by having any VM running and then also start a docker App where Network Type has been set to "Custom : br0" (in my case) and I've set a static IP for the container or toggle between setting static IP and letting docker dhcp assign one. There are probably a lot of users waiting for a stable release who will see this issue, and therefore, I don't think we can publish with this bug. The bug does not occur with any 4.19.x or 4.20.x Linux kernel; but does occur with all kernels starting with 5.0. This implies the bug was introduced with some code change in the initial 5.0 kernel. The problem is that we are not certain where to report the bug; it could be a kernel issue or a docker issue. Of course, it could also be something we are doing wrong, since this issue is not reported in any other distro AFAIK. We are continuing investigation and putting together a report to submit either to kernel mailing list or as a docker issue. In any case, an actual fix will probably take quite a bit more time, especially since we are heading into the holidays. Therefore this is what we plan to do: For 6.8: revert kernel to 4.19.87 and publish 6.8.0-rc8. Those currently running stable (6.7.2) will see no loss of functionality because that release is also on 4.19 kernel. Hopefully this will be last or next to last -rc and then we can publish 6.8 stable. Note: we cannot revert to 4.20 kernel because that kernel is EOL and has not had any updates in months. For 6.9: as soon as 6.8 stable is published we'll release 6.9.0-rc1 on next release branch. This will be exactly the same as 6.8 except that we'll update to latest 5.4 kernel (and "unexpected GSO type" bug will be back). We will use the next branch to try and solve this bug. New features, such as multiple pools, will be integrated into 6.10 release, which is current work-in-progress. We'll wait a day or two to publish 6.8-rc8 with reverted kernel in hopes those affected will see this post first.
  3. 10 points
    New in Unraid OS 6.8 release: The unRAIDServer.plg file (update OS) still downloads the new release zip file to RAM but then extracts directly to USB flash boot device. You will probably notice a slight difference in speed of extract messages. There is still a 'sync' command at the end, which causes each device to spin up serially as Linux kernel syncs each device (why does kernel do this serially? I have no idea). I am tempted to remove this because a Reboot of course spins everything up in parallel, but I'm concerned about users out there who might just hit Reset button and USB flash write data is not fully written. Forms based authentication If you have set a root password for your server, upon boot you'll now see a nice login form. There still is only one user for Unraid so for username enter root. This form should be compatible with all major password managers out there. We always recommend using a strong password. We have auto-logout set to 1 hour. Linux kernel 5.3 default scheduler now 'mq-deadline' enabled Huge Page support, though no UI control yet binfmt_misc support added "Vega 10 Reset bug" patch more device drivers Some out-of-tree (oot) drivers are currently omitted either because the source code doesn't compile or driver doesn't work with the 5.3 kernel: Intel ixgbe [does not build] (using in-tree driver) Highpoint r750 [does not work] Highpoint rr3740a [does not build] This is always the risk with including vendor-supplied drivers. Until the vendor fixes their code we must omit their driver. md/unraid driver Introduced "multi-stream" support: Reads on devices which are not being written should run at full speed. In addition, if you have set the md_write_method tunable to "reconstruct write", then while writing, if any read streams are detected, the write method is switched to "read/modifywrite". Parity sync/check should run at full speed by default. Parity sync/check can be throttled back in presence of other active streams. The "stripe pool" resource is automatically shared evenly between all active streams. As a result got rid of some Tunables: md_sync_window md_sync_thresh and added some tunables: md_queue_limit md_sync_limit Please refer to Settings/Disk Settings help text for description of these settings. Remaining issue: some users have reported slower parity sync/check rates for very wide arrays (20+ devices) vs. 6.7 and earlier releases - we are still studying this problem. WireGuard support - available as a plugin via Community Apps. Our WireGuard implementation and UI is still a work-in-process; for this reason we have made this available as a plugin, though the latest WireGuard module is included in our Linux kernel. Full WireGuard implementation will be merged into Unraid OS itself in a future release. I want to give special thanks to @bonienl who wrote the plugin with lots of guidance from @ljm42 - thank you! I also should give a shout out to @NAS who got us rolling on this. If you don't know about WireGuard it's something to look into! Guide here: WS-Discovery support - Finally you can get rid of SMBv1 and get reliable Windows network discovery. This feature is configured on the Settings/SMB Settings page and enabled by default. Also on same settings page is Enable NetBIOS setting. This is enabled by default, however if you no longer have need for NetBIOS discovery you can turn it off. When turned off, Samba is configured to accept only SMBv2 protocol and higher. Added mDNS client support in Unraid OS. This means, for example, from an Unraid OS terminal session to ping another Unraid OS server on your network you can use (e.g., 'tower'): ping tower.local instead of ping tower Note the latter will still work if you have NetBIOS enabled. User Share File System (shfs) changes: Integrated FUSE-3 - This should increase performance of User Share File System somewhat. Fixed bug with hard link support. Previously a 'stat' on two directory entries referring to same file would return different i-node numbers, thus making it look like two independent files. This has been fixed however there is a config setting on Settings/Global Share Settings called "Tunable (support hard links)". The default is Yes, but with certain very old media and DVD players which access shares via NFS, you may need to set this to No. Note: if you have custom config/extra.cfg file, get rid of it. Other improvements/bug fixes: Format - during Format any running parity sync/check is automatically Paused and then resumed upon Format completion. Encryption - an entered passphrase is not saved to any file. Also included an API for Unassigned devices plugin to open encrypted volumes. Fixed bug where multi-device btrfs pool was leaving metadata set to dup instead of raid1. Several other small bug fixes and improvements. Numerous base package updates. Finally - please note that AFP is now deprecated and we plan to remove in Unraid 6.9 release. Version 6.8.0-rc1 2019-10-11 Base distro: aaa_elflibs: version 15.0 build 11 acpid: version 2.0.32 at-spi2-atk: version 2.34.0 at-spi2-core: version 2.34.0 atk: version 2.34.1 bash: version 5.0.011 btrfs-progs: version 5.2.2 bzip2: version 1.0.8 ca-certificates: version 20190826 cifs-utils: version 6.9 cryptsetup: version 2.2.1 curl: version 7.66.0 dbus: version 1.12.16 dbus-glib: version 0.110 dhcpcd: version 8.0.6 docker: version 19.03.3 e2fsprogs: version 1.45.4 encodings: version 1.0.5 etc: version 15.0 ethtool: version 5.3 expat: version 2.2.9 file: version 5.37 findutils: version 4.7.0 freetype: version 2.10.1 fuse3: version 3.6.2 gdbm: version 1.18.1 gdk-pixbuf2: version 2.38.2 git: version 2.23.0 glib2: version 2.62.0 glibc-solibs: version 2.30 glibc-zoneinfo: version 2019c glibc: version 2.30 glu: version 9.0.1 gnutls: version 3.6.10 gtk+3: version 3.24.10 harfbuzz: version 2.6.0 haveged: version 1.9.8 hostname: version 3.22 hwloc: version 1.11.13 icu4c: version 64.2 intel-microcode: version 20190918 iproute2: version 5.3.0 iptables: version 1.8.3 iputils: version 20190709 irqbalance: version 1.6.0 less: version 551 libICE: version 1.0.10 libX11: version 1.6.8 libXi: version 1.7.10 libXt: version 1.2.0 libarchive: version 3.4.0 libcap-ng: version 0.7.10 libcroco: version 0.6.13 libdrm: version 2.4.99 libedit: version 20190324_3.1 libevdev: version 1.7.0 libevent: version 2.1.11 libgcrypt: version 1.8.5 libgudev: version 233 libjpeg-turbo: version 2.0.3 libnftnl: version 1.1.4 libnl3: version 3.5.0 libpcap: version 1.9.1 libpciaccess: version 0.16 libpng: version 1.6.37 libpsl: version 0.21.0 librsvg: version 2.44.14 libseccomp: version 2.4.1 libssh2: version 1.9.0 libtasn1: version 4.14 libusb: version 1.0.23 libvirt-php: version 0.5.5 libvirt: version 5.7.0 (CVE-2019-10161, CVE-2019-10166, CVE-2019-10167, CVE-2019-10168) libwebp: version 1.0.3 libzip: version 1.5.2 logrotate: version 3.15.1 lsof: version 4.93.2 lsscsi: version 0.30 lvm2: version 2.03.05 lz4: version 1.9.1 mkfontscale: version 1.2.1 mozilla-firefox: version 68.0.2 (CVE-2019-11751, CVE-2019-11746, CVE-2019-11744, CVE-2019-11742, CVE-2019-11736, CVE-2019-11753, CVE-2019-11752, CVE-2019-9812, CVE-2019-11741, CVE-2019-11743, CVE-2019-11748, CVE-2019-11749, CVE-2019-5849, CVE-2019-11750, CVE-2019-11737, CVE-2019-11738, CVE-2019-11747, CVE-2019-11734, CVE-2019-11735, CVE-2019-11740, CVE-2019-11754, CVE-2019-9811, CVE-2019-11711, CVE-2019-11712, CVE-2019-11713, CVE-2019-11714, CVE-2019-11729, CVE-2019-11715, CVE-2019-11716, CVE-2019-11717, CVE-2019-1 1718, CVE-2019-11719, CVE-2019-11720, CVE-2019-11721, CVE-2019-11730, CVE-2019-11723, CVE-2019-11724, CVE-2019-11725, CVE-2019-11727, CVE-2019-11728, CVE-2019-11710, CVE-2019-11709) nano: version 4.5 ncurses: version 6.1_20190720 net-tools: version 20181103_0eebece nettle: version 3.5.1 nghttp2: version 1.39.2 nginx: version 1.16.1 (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516) nodejs: version 10.16.3 nss-mdns: version 0.14.1 ntp: version 4.2.8p13 openldap-client: version 2.4.48 openssh: version 8.0p1 openssl-solibs: version 1.1.1d openssl: version 1.1.1d p11-kit: version 0.23.18.1 pcre2: version 10.33 php: version 7.2.23 (CVE-2019-11042, CVE-2019-11041) pixman: version 0.38.4 pkgtools: version 15.0 procps-ng: version 3.3.15 qemu: version 4.1.0 (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091) qrencode: version 4.0.2 rpcbind: version 1.2.5 rsyslog: version 8.1908.0 samba: version 4.10.8 (CVE-2019-10197) sdparm: version 1.10 sessreg: version 1.1.2 setxkbmap: version 1.3.2 sg3_utils: version 1.44 shadow: version 4.7 shared-mime-info: version 1.12 sqlite: version 3.29.0 sysvinit-scripts: version 2.1 sysvinit: version 2.96 talloc: version 2.3.0 tdb: version 1.4.2 tevent: version 0.10.1 ttyd: version 1.5.2 usbutils: version 012 util-linux: version 2.34 wget: version 1.20.3 wireguard: version 0.0.20190913 wsdd: version 20180618 build 2 xauth: version 1.1 xclock: version 1.0.9 xfsprogs: version 5.2.1 xkeyboard-config: version 2.27 xorg-server: version 1.20.5 xrandr: version 1.5.1 xterm: version 348 xwininfo: version 1.1.5 zstd: version 1.4.3 Linux kernel: version 5.3.6 default scheduler now mq-deadline CONFIG_BINFMT_MISC: Kernel support for MISC binaries CONFIG_DEBUG_FS: Debug Filesystem CONFIG_HUGETLBFS: HugeTLB file system support CONFIG_ICE: Intel(R) Ethernet Connection E800 Series Support CONFIG_IGC: Intel(R) Ethernet Controller I225-LM/I225-V support CONFIG_MLX5_CORE_IPOIB: Mellanox 5th generation network adapters (connectX series) IPoIB offloads support CONFIG_SCSI_SMARTPQI: Microsemi PQI Driver CONFIG_WIREGUARD: IP: WireGuard secure network tunnel patch: fix_vega_reset (user request) patch: increase BLK_MAX_REQUEST_COUNT from 16 to 32 oot: LimeTech md/unraid: version 2.9.10 (multi-stream support) oot: Highpoint rsnvme: version v1.2.16_19_05_06 oot: Tehuti tn40xx: version 0.3.6.17.2 oot: omitted: Intel ixgbe [does not build] (using in-tree driver) oot: omitted: Highpoint r750 [does not work] oot: omitted: Highpoint rr3740a [does not build] Management: fix btrfs bug where converting from single to multiple pool did not balance metadata to raid1, and converting from multiple to single did not balance metadata back to single. auto-mount hugetlbfs to support kernel huge pages emhttpd: do not write /root/keyfile if encryption passphrase provided via webGUI fstab: mount USB flash boot device with root-only access nginx.conf: configure all nginx worker threads to run as 'root'. start/stop WireGuard upon server start/shutdown support forms-based authentication shfs: support FUSE3 API changes; hard links report same st_ino; hard link support configurable support disabling NetBIOS, and set Samba 'min server procotol' and 'min client protocol' to SMB2 if disabled support WS-Discovery method support mDNS local name resolution via avahi extract OS upgrade directly to USB flash webgui: Revamp Banner Warning System webgui: Fix custom case png not surviving reboot webgui: Enhanced display of network settings webgui: Open banner system to 3rd party apps webgui: Modified notify script to allow overriding email recipients in notification settings webgui: Allow Safari to use websockets webgui: Select case correction + replace MD1510 for AVS-10/4 webgui: Font, Icon and image cleanup webgui: Added AFP deprecated notice webgui: Changed config folder of TELEGRAM webgui: Add share access to user edit webgui: Added cache and disk type to shares page webgui: Aligned management page layout webgui: Added conditional UPnP setting on Management page webgui: Support wireguard plugin in download.php webgui: Added UPnP to access script (to support WireGuard plugin) webgui: Made notify script compatible with 6.8 new security scheme webgui: Fixed misalignment of absent disk on Main page webgui: Update ArrayDevices.page help text webgui: show warning on login page when browser cookies are disabled webgui: Fixed docker container update state webgui: Added VM XML files to diagnostics webgui: Telegram notification agent: enable group chat IDs, update helper description webgui: Integrate CAs Plugin Helper webgui: Switch download routine to be PHP Curl webgui: Change PluginHelpers download to be PHP Curl webgui: dockerMan - Deprecate TemplateURL webgui: Fixed: footer always on foreground webgui: Plugin Helpers: Follow redirects on downloads webgui: dockerMan: Redownload Icon if URL changes webgui: If a page is loaded via https, prevent it from loading resources via http (ie, block mixed content) webgui: Ensure spinner always ontop webgui: Allow outside click to close popups webgui: Use complete HTML documents in popups webgui: Standardize on lang="en" webgui: Added 'F1' key to toggle help text webgui: Main page: consolidate spin up/down action and device status into one webgui: support changed tunables on Disk Settings page
  4. 7 points
    Tons of posts related to Windows 10 and SMB as the root cause of the inability to connect to unRaid that were fruitless so I'm recording this easy fix for my future self. If you cannot access your unRaid shares via DNS name ( \\tower ) and/or via ip address ( \\192.168.x.y ) then try this. These steps do NOT require you to enable SMB 1.0; which is insecure. Directions: Press the Windows key + R shortcut to open the Run command window. Type in gpedit.msc and press OK. Select Computer Configuration -> Administrative Templates -> Network -> Lanman Workstation and double click Enable insecure guest logons and set it to Enabled. Now attempt to access \\tower Related Errors: Windows cannot access \\tower Windows cannot access \\192.168.1.102 You can't access this shared folder because your organization's security policies block unauthenticated guest access. These policies help protect your PC from unsafe or malicious devices on the network.
  5. 5 points
  6. 5 points
    It's not written to any permanent storage, it's written to a file in the root file system which is in RAM. Your "secret password" is only to decrypt the drives - even if the password were leaked somehow they still need the physical drives to make use of it. You'll first have to teach her to hack your root login password in order to get into your server. As @bonienl mentioned in above post we have made some changes so that casual user doesn't accidentally leave a keyfile laying around. These will appear in Unraid OS 6.8 release. In meantime, click that 'Delete' button after Starting array and, I'm done talking with you.
  7. 5 points
    Here a guide that shows how to repair XFS filesystem corruption if you are ever unlucky enough to have this happen on your server. Hope its useful if you need to fix it !
  8. 5 points
    For anyone who needs the script here it is: #!/bin/bash # Drives declare -a StringArray=("ata-WDC_WD2003FYYS-70W080_WJUN0123456" "DRIVE2" "DRIVE3" "DRIVE4") # Show status echo "Current drive status: " for drive in ${StringArray[@]}; do hdparm -W /dev/disk/by-id/$drive done # Enable write caching for drive in ${StringArray[@]}; do hdparm -W 1 /dev/disk/by-id/$drive done # Show status again echo "Finished running, check if the write cache was enabled!" for drive in ${StringArray[@]}; do hdparm -W /dev/disk/by-id/$drive done Replace the serial codes in the StringArray and you should be good to go! Pop it in User Scripts.
  9. 4 points
    Instructions For Pi-Hole with WireGuard: For those of you who don't have a homelab exotic enough to have VLANs and who also don't have a spare NIC lying around, I have come up with a solution to make the Docker Pi-Hole container continue to function if you are using WireGuard. Here are the following steps I used to get a functional Pi-hole DNS on my unRAID VM with WireGuard: 1a) Since we're going to change our Pi-hole to a host network, we'll first need to change your unRAID server's management ports so there isn't a conflict with Settings > Management Access: 1) Take your Pi-hole container and edit it. Change the network type to "Host". This will allow us to avoid the problems inherent in trying to have two bridge networks talk to each other in Docker. (Thus removing our need to use a VLAN or set up a separate interface). You'll also want to make sure the ServerIP is set to your unRAID server's IP address and make sure that DNSMASQ_LISTENING is set to single (we don't want PiHole to take over dnsmasq): 2) We'll need to do some minor container surgery. Unfortunately the Docker container lacks sufficient control to handle this through parameters. For this step, I will assume you have the following volume mapping, modify the following steps as needed: 3) Launch a terminal in unRAID and run the following command to cd into the above directory: cd /mnt/cache/appdata/pihole/dnsmasq.d/ 4) We're going to create an additional dnsmasq config in this directory: nano 99-my-settings.conf 5) Inside this dnsmasq configuration, add the following: bind-interfaces Where the listen-address is the IP address of your unRAID server. The reason this is necessary is because without it, we end up with a race condition depending on if the Docker container or libvirt starts first. If the Docker container starts first (as what happens when you set the container to autostart), libvirt seems to be unable to create a dnsmasq which could cause problems for those of you with VMs. If libvirt starts first, you run into a situation where you get the dreaded: "dnsmasq: failed to create listening socket for port 53: Address already in use". This is because without the above configuration, the dnsmasq created by Pi-hole attempts to listen on all addresses. By the way, this should also fix that error for those of you running Pi-hole normally (I've seen this error a few times in the forum and I can't help but wonder if this was the reason we went with the ipvlan set up in the first place). Now, just restart the container. I tested this and it should not cause any interference with the dnsmasq triggered by libvirt.
  10. 4 points
    I'm very much interested in hearing how things go.
  11. 4 points
  12. 4 points
    -rc6 tldr: Updated kernel and Intel microcode for yet another hardware vulnerability. Update to latest qemu stable patch release: 4.1.1 Support UD passphrase-encrypted volumes. Misc. webGUI fixes. Other package updates. Specific changes in [-rcN] are indicated in bold below. New in Unraid OS 6.8 release: The unRAIDServer.plg file (update OS) still downloads the new release zip file to RAM but then extracts directly to USB flash boot device. You will probably notice a slight difference in speed of extract messages. [-rc2] The 'sync' command at the end has been replaced with 'sync -f /boot'. Forms based authentication If you have set a root password for your server, upon boot you'll now see a nice login form. There still is only one user for Unraid so for username enter root. This form should be compatible with all major password managers out there. We always recommend using a strong password. [-rc2] There is no auto-logout implemented yet, please click Logout on menu bar or completely close your browser to logout. Linux kernel 5.3 default scheduler now 'mq-deadline' [-rc2] but this can be changed via Settings/Disk Settings/Scheduler setting. enabled Huge Page support, though no UI control yet binfmt_misc support added "Vega 10 Reset bug" [-rc2] and 'navi-reset' patches removed [-rc5] [-rc2] added oot: Realtek r8125: version 9.002.02 [-rc3] additional md/unraid changes and instrumentation [-rc6] fix chelsio missing firmware more device drivers Some out-of-tree (oot) drivers are currently omitted either because the source code doesn't compile or driver doesn't work with the 5.3 kernel: Intel ixgbe [does not build] (using in-tree driver) Highpoint r750 [does not work] Highpoint rr3740a [does not build] This is always the risk with including vendor-supplied drivers. Until the vendor fixes their code we must omit their driver. md/unraid driver Introduced "multi-stream" support: Reads on devices which are not being written should run at full speed. In addition, if you have set the md_write_method tunable to "reconstruct write", then while writing, if any read streams are detected, the write method is switched to "read/modifywrite". Parity sync/check should run at full speed by default. Parity sync/check is throttled back in presence of other active streams. The "stripe pool" resource is automatically shared evenly between all active streams. As a result got rid of some Tunables: md_sync_window md_sync_thresh and added some tunables: md_queue_limit md_sync_limit [-rc2] md_scheduler Please refer to Settings/Disk Settings help text for description of these settings. WireGuard support - available as a plugin via Community Apps. Our WireGuard implementation and UI is still a work-in-process; for this reason we have made this available as a plugin, though the latest WireGuard module is included in our Linux kernel. Full WireGuard implementation will be merged into Unraid OS itself in a future release. I want to give special thanks to @bonienl who wrote the plugin with lots of guidance from @ljm42 - thank you! I also should give a shout out to @NAS who got us rolling on this. If you don't know about WireGuard it's something to look into! Guide here: WS-Discovery support - Finally you can get rid of SMBv1 and get reliable Windows network discovery. This feature is configured on the Settings/SMB Settings page and enabled by default. Also on same settings page is Enable NetBIOS setting. This is enabled by default, however if you no longer have need for NetBIOS discovery you can turn it off. When turned off, Samba is configured to accept only SMBv2 protocol and higher. Added mDNS client support in Unraid OS. This means, for example, from an Unraid OS terminal session to ping another Unraid OS server on your network you can use (e.g., 'tower'): ping tower.local instead of ping tower Note the latter will still work if you have NetBIOS enabled. User Share File System (shfs) changes: Integrated FUSE-3 - This should increase performance of User Share File System. Fixed bug with hard link support. Previously a 'stat' on two directory entries referring to same file would return different i-node numbers, thus making it look like two independent files. This has been fixed however there is a config setting on Settings/Global Share Settings called "Tunable (support hard links)". [-rc2 ] Fixed the default value Yes, but with certain very old media and DVD players which access shares via NFS, you may need to set this to No. [-rc5] Fixed not accounting for devices not mounted yet. Note: if you have custom config/extra.cfg file, get rid of it. Other improvements/bug fixes: Format - during Format any running parity sync/check is automatically Paused and then resumed upon Format completion. Encryption - an entered passphrase is not saved to any file. Fixed bug where multi-device btrfs pool was leaving metadata set to dup instead of raid1. Several other small bug fixes and improvements. [-rc5] Fixed bug where quotes were not handled properly in passwords. Numerous base package updates [-rc2] including updating PHP to version 7.3.x, Samba to version 4.11.x. Known Issues and Other Errata Some users have reported slower parity sync/check rates for very wide arrays (20+ devices) vs. 6.7 and earlier releases - we are still studying this problem. [-rc6] this is fixed: If you are using Unassigned Devices plugin with encrypted volumes, you must use the file method of specifying the encryption passphrase. Note that a file containing your passphrase must consist of a single null-terminated string with no other line ending characters such as LF or CR/LF. In another step toward better security, the USB flash boot device is configured so that programs and scripts residing there cannot be directly executed (this is because the 'x' bit is set now only for directories). Commands placed in the 'go' file still execute because during startup, that file is copied to /tmp first and then executed from there. If you have created custom scripts you may need to take a similar approach. AFP is now deprecated and we plan to remove support in Unraid 6.9 release. The /mnt/user0 mount point is now deprecated and we plan to remove in Unraid 6.9 release. A note on password strings Password strings can contain any character however white space (space and tab characters) is handled specially: all leading and trailing white space is discarded multiple embedded white space is collapsed to a single space character. By contrast, encryption passphrase is used exactly as-is. Version 6.8.0-rc6 2019-11-15 Base distro: aaa_elflibs: version 15.0 adwaita-icon-theme: version 3.34.3 cpio: version 2.13 cryptsetup: version 2.2.2 curl: version 7.67.0 docker: version 19.03.5 git: version 2.24.0 harfbuzz: version 2.6.4 hostname: version 3.23 intel-microcode: version 20191113 kernel-firmware: version 20191108_f1100d libvirt: version 5.9.0 libxml2: version 2.9.10 libxslt: version 1.1.34 lvm2: version 2.03.06 mkfontscale: version 1.2.1 mozilla-firefox: version 70.0.1 ncurses: version 6.1_20191026 qemu: version 4.1.1 (CVE-2019-14378, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-12068, CVE-2019-11091) shared-mime-info: version 1.15 sudo: version 1.8.29 ttyd: version 20191025 xorg-server: version 1.20.5 xterm: version 350 zstd: version 1.4.4 Linux kernel: version 5.3.11 Management: add missing chelsio firmware emhttpd: properly handle encoded passwords emhttpd: correct footer notifications emhttpd: solve deadlock issue with 'emcmd' called from a plugin webgui: Submit passphrases and passwords in base64 format webgui: Fixed typo in shares settings webgui: Change dashbord link for mb/mem webgui: Fixed diagnostics errors when array was never started webgui: Docker: fixed multi container updates display oddity webgui: Rename docker repositories tab to template repositories webgui: Syslog: allow up to 5 digits port numbers
  13. 4 points
    This is my scenario. @bonienl Please correct anything erroneous in this post. I am not a networking expert and am explaining things according to my understanding with my functioning WireGuard, router, and unRAID configuration. The unRAID server is on the 192.168.1.x subnet and the server IP address is 192.168.1.10 Pi-hole is running on a Raspberry Pi on the same subnet as the unRAID server. Its IP address is 192.168.1.60 I have a dedicated VLAN (192.168.3.x) for docker containers with their own IP address. This appears as Custom: br0.3 in the Docker networks I want Pi-hole as my DNS for WireGuard connected clients just as it is on my LAN I want to be able to access the WebUIs of the docker containers on the 192.168.3.x subnet from a WireGuard remote session Caveat: Docker containers with custom IP addresses on br0 WILL NOT be accessible via WireGuard. This is an intentional design of Docker which isolates bridged networks on the same interface (eth0) as the server host LAN. In order for Docker containers to be accessible via WireGuard remote sessions, they must be on a VLAN (br0.3 in my case) or a different NIC, e.g. eth1. I only use IPv4. If you use IPv6, you will need to appropriately configure that protocol as well. Step 1 - If your router/switches support VLANs configure VLANs. If they do not, make sure eth1 (or another NIC) is enabled and configured. Disable VM Manager (Settings --> VM Manager), Disable Docker (Settings --> Docker), Enable VLANs and create a Docker VLAN in unRAID Settings --> Network Settings. Note: the IPv4 Address Assignment should be 'None' Step 2: In Settings --> Docker configure the appropriate custom network; br0.X or br1 Since I want to assign a static IP address to each docker container on the br0.3 VLAN, I did not assign any DHCP pool addresses. Step 3: If your router and switches support VLANs, configure a VLAN on the router. If your router/switches do not support VLANs, you will need to use a separate NIC in your unRAID server for any docker containers which need a custom IP address. Note: My router is the Ubiquiti USG. Other routers will have a similar configuration if VLANs are supported I want to assign a static IP address to my docker containers on the 192.168.3.x subnet and have specified the DHCP range as 192.168.3.100 - 150. DHCP from the router and DHCP from Docker do not communicate with one another. If you do assign a range of DHCP pool addresses in Docker, they should not be the same addresses as the router DHCP range, if using DHCP. I assign static addresses in the 3.100 - 3.150 range to the containers, so this is not an issue. Note: The first DHCP Name Server is set to the Pi-hole IP address. This is only for LAN connected clients and will not make Pi-hole the DNS server for WireGuard connected clients. Step 4: Make sure no firewall or routing rules restrict traffic between the unRAID server LAN and the Docker VLAN. By default, the USG passes traffic between all "Corporate" LANs/VLANs so no additional configuration is needed. Other routers may require that you explicitly allow such traffic. My LAN IN and LAN OUT Firewall rules are identical which allow traffic in and out of all Corporate LANs. The last network in the screen shot above is 10.253.0.0/24. This is the default WireGuard network and appears here because I defined a static route between this network and the unRAID server. While you are in your router configuration screens, you should do this as seen below. Step 5: Define a static route between the WireGuard network and the unRAID server. Step 6: If UPnP is disabled on your router (as it is in mine), you will need a port forwarding rule for the WireGuard port. Note: The default WireGuard Port is 51820. I had used this port in a WG test on a different server on my LAN, so, I am using port 51830 for my main unRAID server. That's it for the router side of things, so now its on to WireGuard configuration. Step 7: Configure the WireGuard VPN and Peers in Settings --> VPN Manager as per the instructions in the WireGuard Quickstart. Note: The local endpoint is the public IP address or DDNS name of your unRAID server and the port specified should match the port in the router port forwarding rule if UPnP is disabled. Make sure the static route indicated is also present in your router configuration. I have entered the IP address of Pi-hole on the Raspberry Pi as the Peer DNS Server. With my configuration, WireGuard connected clients benefit from Pi-hole ad filtering. When a peer connects to the server via WireGuard, the WebUIs of docker containers running in host or bridge mode are accessible without the VLAN configuration. For Docker containers on custom br0.x networks, the above configuration is necessary. Alternatively, they can exist on br1 or another NIC. If everything is properly configured, a traceroute (tracert in Windows), from a connected peer to a custom docker IP address will result in an output similar to the following: A WireGaurd Peer configuration will look something like this: Note that Pi-hole is the DNS server and the docker VLAN (192.168.3.0/24) appears in the allowed IPs. I hope all of this is helpful to someone.
  14. 4 points
    Here is a video that shows what to do if you have a data drive that fails and you want to swap/upgrade it and the disk that you to replace it is larger than your parity drive. So this shows the swap parity procedure. Basically you add the new larger drive then have Unraid copy the existing parity data over to the new drive. This frees up the old parity drive so it can then be used then to rebuild the data of the failed drive onto the old parity drive. Hope this is useful
  15. 4 points
    Currently I have hand edited options at the end of my VM XML config, as well as a manually selected network model `<model type='vmxnet3'/>` Example: </devices> <qemu:commandline> <qemu:arg value='one'/> <qemu:arg value='two'/> <qemu:arg value='three'/> <qemu:arg value='four'/> </qemu:commandline> </domain> Could the Template editor keep these custom edits by offering an editable field in the template to add <qemu:commandline>, and also offer a dropdown for the network card to allow selecting a model? Thank you in advanced
  16. 4 points
    Forgive the dumb question, I don't actually see where I can upvote this, I can see others that have upvoted, but no option in there for me to do the same, other than to 'like' it. Edit - found it. Hovering over the like button shows an upvote button. Not exactly intuitive but all good.
  17. 4 points
    This is a special release in light of the recent so-called Zombieland vulnerability revealed by Intel earlier this week. Normally we don't generate -rc stable patch releases, however in the interest of maintaining our, and the Community's sanity, this release is exactly the same as 6.7.0 except for updated Intel CPU microcode and corresponding Linux kernel (4.19.43). If 6.7.1-rc1 "fails" with something but 6.7.0 "works" then we can be fairly confident microcode/kernel to blame. We have released this on the next branch in order to get some testing before publishing for everyone on stable. Please post here in this topic, any issues you run across which are not present in 6.7.0 also - that is, issue that you think can be directly attributed to the microcode and/or kernel changes. Version 6.7.1-rc1 2019-05-17 Linux kernel: version: 4.19.43 intel-microcode: version 20190514a
  18. 4 points
    In this inaugural blog in the New Users Blog Series, we talk about: Unraid and the USB flash drive Using the USB Flash Creator tool How drives are counted towards the license limit How to reset your root password How to rename your server (Tower) How to change banner images and themes Check it out and let us know what you think! Have ideas/questions about Unraid that you'd like to see a blog written about? Post them here or send me a DM. Cheers! https://unraid.net/blog/unraid-new-users-blog-series
  19. 4 points
    I'll bite... Recently consolidated Unraid Server: 1X Intel Core i7 8700T 1X Gigabyte Z370N WIFI 2X Supermicro VLP 16GB ECC Unbuffered DDR4 2666 2X Corsair Force MP510 M.2 480GB NVME SSD 2X Seagate BarraCuda 5TB SATA 6Gb/s 128MB Cache 2.5-Inch 15mm 1X Supermicro MCP-220-51401-0N Dual 2.5" Fixed HDD Bracket 1X Seasonic 250SU 250W 80Plus 1U Server Power Supply 2X Supermicro AOC-SGP-I4 QP 1Gbps Ethernet Controller 1X Ameri-rack ARC1-PELY423-C5V3 PCIe bifurcation riser card 1X Thermaltake Engine 27 1X Logic Supply MK100 1U Rackmount Case Mounted in front of: 1X CyberPower OR700LCDRM1U UPS 700VA 400W Roles: NAS, PFSense (bridged LAN ports), Plex Server (Docker), Unifi Management (Docker) Idle Power of Server + PoE AP + Cable Modem = 52W
  20. 3 points
    Overview: Support for Docker image unraid-api in the electricbrain repo. Docker Hub: https://hub.docker.com/r/electricbrainuk/unraidapi Github/ Docs: https://github.com/ElectricBrainUK/UnraidAPI Discord: https://discord.gg/Qa3Bjr9 If you feel like supporting our work: https://www.paypal.me/electricbrain Thanks a lot guys, I hope this is useful!
  21. 3 points
    Oct 12 03:35:17 Storage kernel: tun: unexpected GSO type: 0x0, gso_size 1357, hdr_len 1411 Oct 12 03:35:17 Storage kernel: tun: 13 e4 3d f7 10 86 b8 9e 87 b1 5f 81 d9 7a 98 c9 ..=......._..z.. Oct 12 03:35:17 Storage kernel: tun: 26 fa 2d 78 50 03 f2 b2 22 55 bc 68 29 75 83 46 &.-xP..."U.h)u.F Oct 12 03:35:17 Storage kernel: tun: 04 35 d4 e4 71 d8 5c 04 e3 e2 a2 6d 4e 1f 22 9d .5..q.\....mN.". Oct 12 03:35:17 Storage kernel: tun: 6f 97 72 60 c9 63 2b dc f4 ec c7 4f 68 60 66 9e o.r`.c+....Oh`f. Getting the above message repeated over and over again in the log whenever a docker tries to access the NIC. storage-diagnostics-20191012-0237.zip
  22. 3 points
    Can you bake SNMP into the OS without the need for a separate plugin? Unraid is the only NAS without SNMP installed by default...
  23. 3 points
    August 29th, 2019 marks 14 years of Lime Technology being in business. On August 26, 2005, Tom Mortensen (@limetech), the creator of Unraid, posted the very first introductory post about Unraid and thus began the incredible journey and creation of this amazing community! To date, the Unraid community comprises over 130 countries, an untold number of languages, and thousands of friendly, enthusiastic, and welcoming users! This is the discussion page for the official Unraid 14th Birthday Blog. Feel free to chime in on how you use Unraid, what you thought of the Q&A or anything else that comes to mind! Cheers! https://unraid.net/blog/unraid-14th-birthday-blog
  24. 3 points
    We have multiple-pool support coming in 6.9 release. After that we can look at adding a UI to create vdisks that map to iscsi targets. Please do me a favor however: please move any non-Unraid discussion to another forum.
  25. 3 points
    How has the testing gone over the weekend? Is this the magic setting? mdcmd set md_restrict 1
  26. 3 points
    You don't understand what fmask and dmask do when mounting FAT32 volumes. They are octal values that turn off corresponding permission bits. It causes all files to have only owner RW bits set and all directories to have only owner RWX bits set. There are sensitive files stored on the flash such as your actual passwd file and ssh keys. We are not going to change this back the way it was. The USB boot flash was never meant to store anything other than files necessary to boot and config files. You might notice that since day 1 we have copied the 'go' file to /tmp and executed it from there. Sorry this is an inconvenience but there are many workarounds.
  27. 3 points
    Just as jonathanm said -- Config folders can be swapped from stick to stick, just keep the key file with the physical stick it belongs to. So just follow this procedure. 1./ On the new machine register from the trial to the plus 2./ Shutdown both servers. 3./ Put flash drive from old server (basic key one) into a pc. 4./ Make folder called old server 5./ a/ Copy the config folder from the usb flash drive of old server into the old server folder. b. delete config folder from the flash drive c/ open the config folder (in old server folder on desktop) and copy the basic key into the old server folder (After which make sure that it isnt in the config file that it was moved not copied) 6. remove flash drive 7./ Now put the flash drive in from new server (plus key one) 8./ make folder called new server. 9./ a/ copy the config folder to new server folder. b. delete config folder from the flash drive c/ open the config folder (in new server folder on desktop) and move the plus key into the new server folder (After which make sure that it isn't in the config file that it was moved not copied) Now each flash drive has no config folder (as deleted) and you have the config folder on your desktop in the old server and new server folders along with their keys. 10/ Now move the basic key from the oldserver folder into the config folder in the new server folder 11 ./ Move the plus key from the new server folder into the config folder of the old server folder. Now the flash drive (which was originally from the new server) should still be in the pc. Now move the config folder from the old server folder onto this flash drive. Remove drive. Now this flash drive has a plus key and the config of your oldserver. Put this key in old server and start up. Now put the old servers original flash drive into the pc and copy the config folder from the new server folder into the flash drive. This now has the config for the new server but with the basic key. Put in new server and start the server. If for any reason the server doesn't boot. Put flash drive in a pc and run the file makebootable.bat (but i dont think you should have to do this.)
  28. 3 points
    Upvote the bug report hopefully may help it gain a bit more traction.
  29. 3 points
    Attached is a debugged version of this script modified by me. I've eliminated almost all of the extraneous echo calls. Many of the block outputs have been replaced with heredocs. All of the references to md_write_limit have either been commented out or removed outright. All legacy command substitution has been replaced with modern command substitution The script locates mdcmd on it's own. https://paste.ee/p/wcwWV
  30. 3 points
    @jonp Is there anything you can do about copying and then pasting from the forum winds up adding more often than not hidden characters, etc that cause nothing but problems throughout the forum. eg: https://forums.unraid.net/topic/77813-plugin-linuxserverio-unraid-nvidia/?page=25&amp;tab=comments#comment-735664 https://forums.unraid.net/topic/79012-support-linuxserverio-openvpn-as/?page=51&amp;tab=comments#comment-734550 https://forums.unraid.net/topic/78929-docker-image-corrupt/?tab=comments#comment-732967 https://lime-technology.com/forums/topic/38582-plug-in-community-applications/?page=85&amp;tab=comments#comment-669454 https://lime-technology.com/forums/topic/38582-plug-in-community-applications/?page=84&amp;tab=comments#comment-664991 and it goes on and on. I *could* understand if copying / pasting from normal text, but this also affects code blocks I had to put in a PR a while ago just so CA would install no problems. https://github.com/limetech/webgui/pull/351
  31. 3 points
    Been asked about putting the time machine share on an unassigned disk rather than the array. So here's how
  32. 3 points
    Highlight the file you want to edit, hit F4 or click the F4 Edit button.
  33. 3 points
    i'm running my two unraid as VMs on top of ESXi for years. i'm using PlopKExec without problems.. https://download.plop.at/plopkexec/plopkexec.iso if you don't run any VMs, 4GB would be reasonable, but you can add more latter if you want. but according transcoding - you should just run some tests to see, how much it eats your CPUs, start with 4 vCPU. Free version of ESXi have a 8 vCPU limitation. i'm trying avoid any transcoding in my plex server. but you can go new unraid nvidia route and transcode with your GPU - check the plugin forum page. if you pass your IBM 1015 to unraid VM, then ESXi has nothing to do with it and drives connected to it - unraid manages spindowns of these drives. and according SSDs attached to host - i have two in my server and never noticed any problems with them.
  34. 3 points
    Let's start with my setup: Motherboard: ASUS X470-F Gaming (Socket AM4) CPU: AMD Ryzen 7 2700X (does not have integrated graphics) Memory: 32GB Storage: 2 x 512GB NVME SSDs (no RAID) GPU0 (top PCIE slot): EVGA GTX 1050 GPU1 (secondary PCIE slot): EVGA GTX 1080Ti Hybrid Network: Single onboard gigabit nic Everyone's got something different, but the above it working for me just fine. Here are the hurdles I faced during this journey: * My Native Instruments Komplete Audio 6 would panic and reset itself in a Windows 10 guest. - To fix this, I had to look at my IOMMU groups and find a USB controller that doesn't share the same IOMMU group as anything else important, then "stub" it to keep the Unraid underlying OS from claiming it during boot. * As a result of the above, I became limited in which USB ports I could use for VMs - But, to be fair, I can now unplug/replug anything I want on the Windows 10 guest. That's the benefit of binding an entire USB controller. * I found I was completely unable to pass through my primary graphics card to a Linux guest. - To fix this, I had to stub the card, AND - and this is the most important bit - I had to disable EFI frame buffering (or something like that). These bits are all done in the Unraid kernel startup line. * My Linux guest had stuttery, demonic audio over HDMI and video would lag when audio was playing. - To fix this, I had to enable some intel sound options inside the Linux guest, which I found amusing since nothing in my machine is Intel (something about the virt layer needing this). Let's dig into each. USB audio interface runs terribly when passed through This happens because of the emulation layer. The only way will be to find out which USB controller can be stubbed. To figure out which one, get on Unraid and open a terminal and run: lspci | grep USB Take note of the IDs there, then run: for iommu_group in $(find /sys/kernel/iommu_groups/ -maxdepth 1 -mindepth 1 -type d);do echo "IOMMU group $(basename "$iommu_group")"; for device in $(\ls -1 "$iommu_group"/devices/); do if [[ -e "$iommu_group"/devices/"$device"/reset ]]; then echo -n "[RESET]"; fi; echo -n $'\t';lspci -nns "$device"; done; done In this big list you're looking for something like this: IOMMU group 20 0b:00.3 USB controller [0c03]: Advanced Micro Devices, Inc. [AMD] USB 3.0 Host controller [1022:145f] Notice how this USB controller is the ONLY device in this IOMMU group (which just so happens to be group 20 on my machine). This means that we should be able to completely isolate it from the Unraid host OS so we can let the VM claim it completely and without question. To stub it, we modify the kernel startup line. You can either use terminal and modify /boot/syslinux/syslinux.cfg or you can use the Unraid web UI and go to Main -> click "Flash" under 'Boot Device' -> then edit the 'Unraid OS' section under 'Syslinux Configuration' Here's what it looks like when I stub ONLY the above USB controller: kernel /bzimage append initrd=/bzroot vfio-pci.ids=1022:145f Save that change, then reboot Unraid. You can now edit your VM and at the bottom, uncheck the USB devices and instead pass through the USB hub itself. That should fix it. I can't pass through my GPU in the top slot because Unraid is using it Correct, but we can be aggressive about it and do it anyway. Start by finding the device IDs using lspci: root@funraid:~# lspci | grep VGA -A1 09:00.0 VGA compatible controller: NVIDIA Corporation GP107 [GeForce GTX 1050 3GB] (rev a1) 09:00.1 Audio device: NVIDIA Corporation GP107GL High Definition Audio Controller (rev a1) 0a:00.0 VGA compatible controller: NVIDIA Corporation GP102 [GeForce GTX 1080 Ti] (rev a1) 0a:00.1 Audio device: NVIDIA Corporation GP102 HDMI Audio Controller (rev a1) Above, you can see that my GTX 1050 and its associated audio interface are on 09:00.(0|1) So now I need to find out the device IDs: root@funraid:~# lspci -n | grep 09:00. 09:00.0 0300: 10de:1c83 (rev a1) 09:00.1 0403: 10de:0fb9 (rev a1) Awesome. Let's stub those, too... but remember! We need to also disable EFI frame buffering (I think that's what it's called). This means that when you boot Unraid next, you WILL NOT have any console output after the main bootloader (the blue screen) completes - your main GPU that you're passing through (in this case, my GTX 1050) will appear to freeze at that bootloader. If you see the OS even remotely start to boot, you didn't do this right. In addition to the USB hub, we'll also stub the GPU and its audio interface and disable EFI FB: kernel /bzimage append initrd=/bzroot vfio-pci.ids=1022:145f,10de:1c83,10de:0fb9 video=efifb:off Save that and reboot Unraid, and all will be well. You might - and this is very unlikely, but - you might need to supply a VGA bios from techpowerup for your card, or worst case put the card you are trying to use here into PCIE slot 2 and dump its BIOS from the Unraid OS, but I really don't think you'll have to. My Linux guest has demonic, stuttery audio and video when trying to play videos and audio is coming over HDMI through my nVidia card. Me too, and I dug for a bit and found out that I can simply give the Linux guest a modprobe line to clear up this behavior. Inside of the Linux guest's OS (NOT UNRAID!), create a conf file in /etc/modprobe.d/... and use the EXACT same data I use below. Here's mine: [root@archer ~]# cat /etc/modprobe.d/snd-hda-intel.conf options snd-hda-intel enable_msi=1 That's it. Literally one line. Yeah, you have to type that in word for word. Don't worry, I know, you're not running anything Intel - but trust me, it works. Save that and reboot the Linux guest OS. Everything should be in order. I really hope this all helps someone. Thanks! :o)
  35. 3 points
    Thanks for that. Just in case someone else has this issue and to expand upon what @dmacias said. I had to go into Nerdtools and set it to download and install the pip package. Once that was done everything worked again. Thank you!
  36. 3 points
    To clarify: in the case of a single "disk1" and either one or two parity devices, the md/unraid driver will write the same content to disk1 and to either or both parity devices, without invoking XOR to generate P and without using matrix arithmetic to calculate Q. Hence in terms of writes, single disk1 with one parity device functions identically to a 2-way mirror, and with a second parity device, as a 3-way mirror. The difference comes in reads. In a typical N-way mirror, the s/w keeps track of the HDD head position of each device and when a read comes along, chooses the device which might result in the least seek time. This particular optimization has not been coded into md/unraid - all reads will directly read disk1. Also, N-way mirrors might spread reads to all the devices, md/unraid doesn't have this optimization either. Note things are different if, instead of a single disk1, you have single disk2 (or disk3, etc), and also a parity2 device (Q). In this case parity2 will be calculated, so not a true N-way mirror in this case.
  37. 3 points
    Posting to confirm the smoothness of this process. I changed the motherboard, CPU and kept the order of the HDDs. Push power on, everything working like nothing changed. Cool stuff.
  38. 3 points
    Go to the Docker tab. Find the Binhex-Krusader in the Dockers list. Click on it (see picture below) and select "Edit". The Binhex-Krusader Docker edit screen pops up. Go down the list until you see the /mnt/disks/ for the container path for unassigned. Click the "Edit" button to the right of it. The details pop-up for the unassigned devices paths. Go down the list to "Access Mode" and change that to "RW/Slave" and then save.
  39. 2 points
    People who can't read shouldn't run servers.
  40. 2 points
    Just to add my tuppence worth to this. I run Ubuntu on my desktop and with rc3 I am unable to see any of my Unraid machines on the LAN in my file browser, tried a few different file managers on my laptop, didn't make any difference at all, tried altering my SMB settings in Unraid, again didn't make a difference at all, downgraded to 6.7.2 and my machines reappear on the network browser in my file manager. However even on rc3 I was able to browse my network shares by addressing them directly in the file manager with smb://192.168.0.100/$share or smb://matrix/$share So I think that this all points to an issue with smb. I have one machine with netbios enabled and one without netbios enabled to test. Both are discoverable on v6.7.2 neither are discoverable on rc1/rc3. My main machine is the local master via the Dynamix Local Master plugin. EDIT: Actually when I've written rc1, I should have written v6.7.2, dunno what I was thinking. Have edited my post to reflect this.
  41. 2 points
  42. 2 points
    Version 2.1 has been pushed Changelog: Controller Information: Display the Partiy/Disk/Cache label in the port listing if the drive is assigned Controller Benchmark: Display unRAID's Parity/Disk/Cache labels in graph Update Highcharts from 6.0.7 to 7.1.2 Display simultaneous max throughput in the Controller Benchmark graph Add "Avg" to Controller Benchmark graph labels to better clarify the value Dynamically configure Controller Benchmark graph's height based on number of drives attached When editing the drive vendor, display the drive info page instead of the home page on submit
  43. 2 points
    If you haven’t signed up or missed our July digest, check it out here 🤙🤙
  44. 2 points
    Yes just swap it over and boot up with the usb flash drive from the old server. Unraid will look for the drives based on the serial numbers of the drives and add them as they were before. But as @itimpi says a screenshot of the drives is a good idea .
  45. 2 points
    I tested the Dynamix S3 Sleep plugin with "Set WOL options before sleep" set to "g" this did not fix the issue. Entering the "ethtool -s eth0 wol g" command into the "Custom commands before sleep" field does allow for WOL to work when the system goes to sleep due to the plugin.
  46. 2 points
    Maybe an on / off switch for all these Intel MC updates 🙂 ? By the time this thing is done, all my intel boxes will be ~20+% less in performance for my home systems.
  47. 2 points
    most def smarter to run in separate docker containers, if you run it all in one large vm and that vm goes bang (bad update, whatever) then you lost the lot, sure you can restore the vm's vdisk from backup but its going to take time to do. The other thing to keep in mind is bad application releases, this does happen and sometimes you want to roll back the application, this is harder to do in a vm environment and not always 100% clean rollback is possible. if you have it all as separate docker containers, if one goes bang you loose one app and only one app, and you can recover from this within minutes, delete container, re-create container, you're up and running!, sure you may get into situations where config data is corrupt, that can happen, but its not common and a restore of the config data (significantly smaller than a vm restore!) and you are back!. if you have a bad application release and you want to roll back then you simply stop the container, delete the container, pull the image with the version you want , re-create the container and you are done, no risky uninstall reinstall or downgrade, its a clean install every time!.
  48. 2 points
    I issued another quick update that should never have a false positive, (uses hdparm instead), and will catch (if it ever happens) that write-caching is disabled but smartctl doesn't show that fact. That I could test
  49. 2 points
    Download from here: https://s3.amazonaws.com/dnld.lime-technology.com/test/numad Probably can just keep this on your flash device, from console do something like this: cd /boot wget https://s3.amazonaws.com/dnld.lime-technology.com/test/numad numad To invoke from 'go' file add this line: /boot/numad It has numerous options you can get from aforementioned 'man' page. If you determine this is useful we can include with bzroot image and create a proper 'rc.numad' script.
  50. 2 points
    same issue ubtunu 18.04 by running: sudo dhclient enp3s0 I was able to get a connection again