-
Posts
28,772 -
Joined
-
Last visited
-
Days Won
314
Content Type
Profiles
Forums
Downloads
Store
Gallery
Bug Reports
Documentation
Landing
Everything posted by Squid
-
The current internal release (rc6.1) allows for /mnt -> /mnt to work and have access to exclusive shares via that no problems. (note that any share that isn't exclusive does not have any problem via /mnt or /mnt/user) /mnt/user as a host path does not allow for access to exclusive shares. Work is underway to have a setting to Global Share Settings to enable / disable exclusive shares. Assuming that a setting for enable / disable gets implemented, then at the same time FCP would also have a new test that would look at the paths for installed containers and then either warn people to ensure that exclusive access is enabled if the host path isn't compatible or a message saying that it's OK to enable.
-
You need to enable both Virtualization support (VT-x) and IOMMU / Vandendool / VT-d in the BIOS. VT-x is usually easy to find. VT-d is likely buried within various sub-menus in the BIOS
-
Support request: no GUI after repairing corrupted bz* files
Squid replied to uk100's topic in General Support
in the certificate "/etc/ssl/certs/unraid_bundle.pem" Access directly from the IP address and then set in Settings, Management Settings to not use SSL. SSL and the certificate is no longer supported on your OS revision. You should ideally update to 6.11.5 -
unraid keeps starting parity checks for no apparent reason
Squid replied to cholzer's topic in General Support
History says that powerdown originally was a script (from a forum user om the 4.x days) that shutdown the services etc. Now that doesn't happen but reboot / shutdown does but since powerdown is so prevalent in the muscle memory and forums it still exists but simply to call the actual LT scripts -
unraid keeps starting parity checks for no apparent reason
Squid replied to cholzer's topic in General Support
It's not. powerdown -r simply calls reboot If powerdown ever stopped working, I'd be the first to bring the wrath of the gods down on LT (and probably my wife's wrath too). Muscle memory etc dictates that everyone here says "powerdown -r" instead of "reboot" -
Post your diagnostics But, the first question is have you formatted the drives yet? Are they all listed as being unmountable in Main?
-
Did you try restoring it yet?
-
[6.11.5 - 6.12.0] Docker is Maxing out CPU and Memory, Triggering `oom-killer`
Squid commented on Ryonez's report in Stable Releases
-
Internal Error: QEMU unexpectedly closed monitor.
Squid replied to androo303's topic in VM Engine (KVM)
Do you remember doing any manual XML edits when you set up the VM in the first place? Changing the memory via the template would have resulted in the manual edits being lost. -
Direct Stream is what you ideally want. It means the client supports the resolution, bitrate etc and can play it natively. Why would you want it to transcode under those circumstances? You need to get it to transcode first (you can do this on the client by changing it's playback settings) and then you'll see if it's using hardware or software to transcode
-
Network issues: Fix common problems refer to Nic not visible.....
Squid replied to frodr's topic in General Support
Make a backup of /config/network.cfg on the flash drive Then first try making a change (any change) to the bond0 / br0 entries and apply. If it didn't refresh it to get rid of the extraneous entry, try to edit it (any editor should work) and delete this section IFNAME[5]="eth7" PROTOCOL[5]="ipv4" USE_DHCP[5]="no" IPADDR[5]="192.168.60.200" NETMASK[5]="255.255.255.0" and then all the sections after it rename them from [6] to be [5], [7] to be [6] etc. -
DHCP is already enabled by default. Server name, simply go to Settings - Identification.
-
Network issues: Fix common problems refer to Nic not visible.....
Squid replied to frodr's topic in General Support
The reference is there. Part of bond0 [eth0] => Array ( [DHCP_KEEPRESOLV] => yes [DNS_SERVER1] => 8.8.8.8 [DNS_SERVER2] => 8.8.4.4 [DNS_SERVER3] => [DHCP6_KEEPRESOLV] => no [BONDING] => yes [BONDNAME] => bond0 [BONDNICS] => eth0,eth1 [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => yes [BRNAME] => br0 [BRNICS] => bond0 [BRSTP] => no [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => no [IPADDR:0] => 10.10.50.200 [NETMASK:0] => 255.255.255.0 [GATEWAY:0] => 10.10.50.1 [METRIC:0] => [USE_DHCP6:0] => yes [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) [eth2] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => no [IPADDR:0] => 192.168.70.200 [NETMASK:0] => 255.255.255.0 [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) [eth3] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => yes [BRNAME] => br3 [BRNICS] => eth3 [BRSTP] => no [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => [IPADDR:0] => [NETMASK:0] => [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => trunk [VLANID:1] => 4 [DESCRIPTION:1] => forexLAN [PROTOCOL:1] => ipv4 [USE_DHCP:1] => yes [IPADDR:1] => 169.254.31.118 [NETMASK:1] => 255.255.0.0 [GATEWAY:1] => link [METRIC:1] => [USE_DHCP6:1] => [IPADDR6:1] => [NETMASK6:1] => [GATEWAY6:1] => [METRIC6:1] => [PRIVACY6:1] => ) [eth5] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => no [IPADDR:0] => 192.168.60.200 [NETMASK:0] => 255.255.255.0 [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) [eth6] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => [USE_DHCP:0] => [IPADDR:0] => [NETMASK:0] => [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) [eth7] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => no [IPADDR:0] => 192.168.60.200 [NETMASK:0] => 255.255.255.0 [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) [eth8] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => yes [IPADDR:0] => [NETMASK:0] => 0.0.0.0 [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => trunk [VLANID:1] => 5 [DESCRIPTION:1] => 10G_LAN [PROTOCOL:1] => ipv4 [USE_DHCP:1] => [IPADDR:1] => [NETMASK:1] => [GATEWAY:1] => [METRIC:1] => [USE_DHCP6:1] => [IPADDR6:1] => [NETMASK6:1] => [GATEWAY6:1] => [METRIC6:1] => [PRIVACY6:1] => ) [eth9] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => yes [BRNAME] => br9 [BRNICS] => eth9 [BRSTP] => no [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => yes [IPADDR:0] => [NETMASK:0] => 0.0.0.0 [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => trunk [VLANID:1] => 5 [DESCRIPTION:1] => 10 G_LAN [PROTOCOL:1] => ipv4 [USE_DHCP:1] => [IPADDR:1] => [NETMASK:1] => [GATEWAY:1] => [METRIC:1] => [USE_DHCP6:1] => [IPADDR6:1] => [NETMASK6:1] => [GATEWAY6:1] => [METRIC6:1] => [PRIVACY6:1] => ) [eth10] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => no [IPADDR:0] => 192.168.70.200 [NETMASK:0] => 255.255.255.0 [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) [eth11] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => yes [BRNAME] => br11 [BRNICS] => eth11 [BRSTP] => no [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => ipv4 [USE_DHCP:0] => yes [IPADDR:0] => 169.254.132.255 [NETMASK:0] => 255.255.0.0 [GATEWAY:0] => link [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => trunk [VLANID:1] => 4 [DESCRIPTION:1] => forexLAN [PROTOCOL:1] => ipv4 [USE_DHCP:1] => [IPADDR:1] => [NETMASK:1] => [GATEWAY:1] => [METRIC:1] => [USE_DHCP6:1] => [IPADDR6:1] => [NETMASK6:1] => [GATEWAY6:1] => [METRIC6:1] => [PRIVACY6:1] => ) [eth12] => Array ( [BONDING] => no [BONDNAME] => bond0 [BONDNICS] => [BONDING_MODE] => 1 [BONDING_MIIMON] => 100 [BRIDGING] => no [BRNAME] => br0 [BRNICS] => [BRSTP] => 0 [BRFD] => 0 [DESCRIPTION:0] => [PROTOCOL:0] => [USE_DHCP:0] => [IPADDR:0] => [NETMASK:0] => [GATEWAY:0] => [METRIC:0] => [USE_DHCP6:0] => [IPADDR6:0] => [NETMASK6:0] => [GATEWAY6:0] => [METRIC6:0] => [PRIVACY6:0] => [MTU] => [TYPE] => access ) ) -
Really depends upon how you are set up if there will be an issue. It's the passing of /mnt or /mnt/user to a container where there is a problem and then accessing the exclusive share from it. (EG: on the Krusader app, /media gets mapped to /mnt/user. You can access everything from it except for the exclusive shares) 99.9% of the time this shouldn't be done, as it's a quick and dirty shortcut, and you are effectively giving the container access to your entire server (eg: Does Plex really need access to your banking information?) In other words, most people will already have their appdata share being "exclusive" and its not an issue because it winds up getting passed through as /config -> /mnt/user/appdata) But, as has been stated already it's being looked at.
-
For best results, always use IP addresses, and make sure the machines are all using static IPs either at the router or in their own settings.
-
You need to post your diagnostics
-
Why do we need virtual box when we already have KVM built-in?
-
No inherent problem with this. I used to do it all the time, saving downloads to a second server via SMB. Sans any real details, make sure that the remote mount (presumably you're passing it through to a docker container via a separate mount point) is mounted Read/Write:SLAVE
-
Most plugins will log into the syslog (if they log / have an option to). For those that don't log to syslog (CA is the prime example), they have their own specific area and there is no requirement / convention that they be placed anywhere
-
Since there is no quick and dirty workaround and stable is imminent, I'm going to mark Tailscale as being incompatible until such time as the situation changes.