tmchow

Members
  • Posts

    441
  • Joined

  • Last visited

Posts posted by tmchow

  1. I've had tailscale running on my unraid server for awhile now, but have been using some script method I found way back. 

     

    #!/bin/bash
    set -x
    
    # check latest version against what's installed
    VER=$(curl -sL https://api.github.com/repos/tailscale/tailscale/releases/latest |  jq -r ".tag_name" | cut -c 2-)
    if [ "$VER" = "$(tailscale version | head -n1)" ]; then
        echo "$VER already installed, exiting..."
        exit 0
    fi
    
    # download latest version, restart daemon
    echo "New version $VER available. Grabbing..."
    curl -fsSL -o /boot/config/tailscale/tailscale_static.tgz "https://pkgs.tailscale.com/stable/tailscale_${VER}_amd64.tgz"
    if [ $? -eq 0 ]; then
        pkill tailscaled
        sleep 1
        /usr/sbin/tailscaled -cleanup
        bash /boot/config/tailscale/install.sh
        bash /boot/config/tailscale/start.sh
    fi

     

     

    I just noticed this plugin.. is this the recommended way to go vs rolling my own thing with this script? I cannot remember for the life of me why that script was recommended...perhaps before a plugin was created?

  2. 5 hours ago, T4ser said:

    Hello, would it be possible to update N8N to the latest version? I use a community made rss trigger and since they made the update it broke all my services. Their official site says the problems will be solved with the latest update. Thank you very much for n8n. Peace.


    what’s not working with this template that you can’t update to the latest version?

  3. 5 hours ago, scud133b said:

    Confirming that this worked for me with a Smart-UPS X 1500.

     

    At some point in the past I updated it to firmware UPS 15.0 (ID20) -- not sure if that's relevant.

    Hmm. I don’t see this option at all in my configuration.  
     

    https://imgur.com/a/OzZLKl6

     

    I'm not sure how to update the firmware on my unit (I've also got a APC Smart-UPS X 1500).  I recall trying to do this connecting the USB cable to a windows laptop but the software couldn't find it.

     

    According to the menus I’m currently on:

     

    firmware 09.8 ID:20

    My date code is 2003 so it should be updated according to this page here:

     

    Quote

    SMX750, SMX1000, SMX1500 with ID 11 and firmware UPS 02.x or lower. These units are 120 V devices built prior to date code 1037. Date code is the first 4 numbers in your serial number. (e.g. Serial Number AS1036123456 would not be supported.)

     

    According to that page my firmware update should work but when I previously tried this it didn't work.  I got to 7% and it power cycles with no update successful:

     

  4. 4 minutes ago, RichardU said:

    I have n8n installed on my unRaid server A and just tried installing it on my unRaid server B. When trying to copy over the settings, I noticed that the new installation wasn't asking for: Basic Auth, Basic Auth Username, and Basic Auth Password. Am I supposed to add those manually? 

     

    When I install without those, I get the same error as frankie666.

     

    Basic auth isn’t supported anymore so those aren’t needed. As for the error it looks like a permission issue. Make sure the directory and file are accessible by the n8n user 

     

     

  5. Hi, sorry!  I haven't paid much attention to this container I created support for until now as I don't use n8n much.

     

    However, I have done updates which should fix this for n8n 1.x launch:

     

        - Changed home directory to `/home/node/.n8n` from `/root/.n8n`
        - Renamed webhook tunnel variable to `WEBHOOK_TUNNEL`
        - Dropped basic auth config since it's deprecated in n8n 1.x 

  6. 14 hours ago, dnLL said:

    I'm surprised this hasn't been answered as it comes pretty high on search engines. Anyways.

     

    The important thing is to understand what we are dealing with here. For instance, here is what my /var/log looks like currently:

     

    root@server:~# df -h /var/log
    Filesystem      Size  Used Avail Use% Mounted on
    tmpfs           128M  105M   24M  83% /var/log
    
    root@server:~# du -ahx /var/log | sort -hr | head
    105M    /var/log
    50M     /var/log/syslog.2
    38M     /var/log/nginx/error.log.1
    38M     /var/log/nginx
    8.3M    /var/log/samba
    7.3M    /var/log/syslog
    5.6M    /var/log/samba/log.rpcd_lsad
    2.7M    /var/log/samba/log.samba-dcerpcd
    1.4M    /var/log/syslog.1
    704K    /var/log/pkgtools

     

    So, what is going on here? Long uptime, mover logging enabled, and... a bunch of nginx errors. Unsure why but nginx crashed (the webUI became weirdly unresponsive), it took me a while to notice as I wasn't specifically monitoring the content of that log file and didn't visit the webUI in a while as well. Anyways, of course here cleaning things up would be good enough, at the same time 128M is a very small amount of space. You don't want your /var/log to fill up your memory, but you don't want to lose your syslog in the event of an issue similar to the nginx issue I had. Basically, as long as you have plenty of memory available, it's safe to expand it to say 512M or even 1G, by 2023's standards keeping 1G of logs isn't that bad. Using a proper syslog server would definitely offer better solutions in terms of long-time logging and archiving.

    Thanks. I came to this conclusion after posting my original post.  Appreciate you chiming in to reaffirm!

  7. 15 hours ago, craigr said:

     

    For those who may not realize, for this to work, the PLEX container must be mapped like this:

     

     

     

    transcode.thumb.png.61fa8f285a018899f187e434327f70cc.png

     

     

     

    craigr


    you can also accomplish this within Plex server settings specify the transcode directory to be /transcode/PlexRamScratch instead of it being /transcode 

    • Like 1
  8. On 2/1/2023 at 1:22 AM, Kilrah said:

    Just that, lack of protection.

    That's why the standard way of using Unraid is having an SSD cache pool on which the VM images are and which you can set up as RAID1 for protection.


    my cache drives are in a cache pool actually.  So instead of putting the imagined on a single ssd connected with unassigned drives plug-in, sounds like I should put it on the cache pool?

  9. On 2/10/2023 at 4:33 AM, frankie666 said:

    Thanks @tmchow for the docker. It works perfectly for me, however since a while it is impossible to update for new releases... see picture.

    What could be the issue ?

    Thanks again.

     

    Hey! Sorry, I'm not using this regularly anymore hence me not looking at this. I dived back into this and saw the same "not available" message you had. However, I deleted the container and reinstalled it from scratch and it seems to work.  Not sure what is different as the XML is exactly the same.

     

    Try reinstalling from scratch? 

     

    image.png.007812288024545fedf98ae9ea519620.png

  10. I’ve been running Home Assistant in a VM for years on my unraid server.  However, the disk image has always been on my array.  I didn’t think of this until recently, when I added a Win10 VM, and it was so slow to use.  After some research the clear culprit was the image being on the array.  I moved it to to an SSD that is connected in unassigned devices plugin.  As soon as I did that win10 QAS very responsive. 
     

    Home Assistanr overall works fine with the image on the array, but ive found it a bit slow for many things like updates. Given my win10 experience it got me thinking whether I should also move this image to the SSD not in the array.  
     

    Being on the array gives me the security of data protection that comes with the array but wondering the downsides of moving it to the ssd outside the array?

  11. Super basic question that I coiuldn’t find answer to… since this is installed via a plugin, is there any issue with rebooting the system and losing config? Or does the rclone config we add survive reboots?

  12. 25 minutes ago, Oublieux said:


    If I am doing this funky thing and giving Docker containers their own IP address via the Unraid br0 network... is there a way I can still use Tailscale and access the Docker containers remotely?


    can you just access them via the unraid server’s iP with the port number mapped to the container?

  13. Is it possible to run a given user script on multiple schedules? For example, I’d want one to run at array start, and weekly at say Friday at 8pm.

     

    is the only way to do this to create a second user script that either dupes the first script and set that to the second schedule, or have a second user script that just calls the script of the first?

  14. 5 hours ago, tmchow said:

    Thanks @dsmith44 for this container. Works great for my clients on my tailnet to access my Unraid server more securely when I’m not at home without worrying about wireguard or other clunky VPN setup!

     

    I’ve got a 2 questions about something I”m trying to accomplish:

     

    1. I just got Tailscale SSH setup by going into the container command line, and running “/app/tailscale up --ssh”.  However, should I be running that by adding the “--ssh” command into the UP arguments of the container config to account for container restarts? Or is it sufficient that it’s done only once via command line and this will persist across container restarts?
    2. Larger problem related to #1, is that when I get Tailscale SSH running, if I SSH into my Unraid server, I”m actually connecting to the container itself instead of the Unraid host. Any way around this?  I want to eliminate all this SSH key management.  I think the only way to potentially do this is to figure out installing Tailscale natively into Unraid and not within a container?
    3. One thing I’d like to do is from the Unraid command line, to SSH into another server on my tailnet.  Is this possible?  Since tailscale is running within the container, the tailscale binary itself isn’t available to Unraid directly, so not sure if this is possible as I don’t think the tailscale magicDNS stuff is recognized at the Unraid level outside the container. 


    Found answer to my own question:

    https://gist.github.com/auth/github/callback?return_to=https://gist.github.com/shayne/25e194e068751e281937ef68edefb99b&browser_session_id=fd34397b87999ea789b8fe352a941bd934d618392aa50b2c010b21c5cc417eff&code=5e94e3bb523a98b3e868&state=64cadd3d745b45ef88123c51d63a6fa2cf87cda1cb9c517d93b4d6768ab1462a

  15. Thanks @dsmith44 for this container. Works great for my clients on my tailnet to access my Unraid server more securely when I’m not at home without worrying about wireguard or other clunky VPN setup!

     

    I’ve got a 2 questions about something I”m trying to accomplish:

     

    1. I just got Tailscale SSH setup by going into the container command line, and running “/app/tailscale up --ssh”.  However, should I be running that by adding the “--ssh” command into the UP arguments of the container config to account for container restarts? Or is it sufficient that it’s done only once via command line and this will persist across container restarts?
    2. Larger problem related to #1, is that when I get Tailscale SSH running, if I SSH into my Unraid server, I”m actually connecting to the container itself instead of the Unraid host. Any way around this?  I want to eliminate all this SSH key management.  I think the only way to potentially do this is to figure out installing Tailscale natively into Unraid and not within a container?
    3. One thing I’d like to do is from the Unraid command line, to SSH into another server on my tailnet.  Is this possible?  Since tailscale is running within the container, the tailscale binary itself isn’t available to Unraid directly, so not sure if this is possible as I don’t think the tailscale magicDNS stuff is recognized at the Unraid level outside the container. 
  16. 18 hours ago, iEusKid said:

    thanks for your work

     

    ** Note that this will expose your whole server into your tailscale VPN network **

     

    can you elaborate more? do you only main it will expose it other devices connected to the same tailnet? this is my use case

     

    or u meant beyond that? like if there is something i don't know about the security of tailscale (which i really don't know much about it)

     

    This is really just making sure you understand this that isn’t just exposing the container to your tailnet, but rather your entire Unraid server.  That said, this should be expected in the way most, if not all, want tailscale to work on Unraid by installing this container anyways.

     

    As long as you are following the default configuration of your tailnet, or your customizations to your ACL config is secure, you should be fine.

  17. On 4/13/2021 at 4:20 PM, prune said:

    Hi,
    Looks like there is a missing step and a missing field in the Unraid UI in order to fully configure the Telegram agent.
    I think we need to put the telegram chatid somewhere.
    When you read the /boot/config/plugins/dynamix/notifications/agents/Telegram.sh script, you see that it references a /boot/config/plugins/dynamix/telegram/chatid file containing the chatid number.
    But in the Unraid telegram agent configuration UI, there is no chatid field (I'm using 6.9.2)

    In order for the Telegram agent to work, I had to create the file with my bot chatid:
    echo "MyChatIDnumber" > /boot/config/plugins/dynamix/telegram/chatid
    (Just replace MyChatIDnumber by your chat ID number including the minus (-) sign if any)

    Then clicked the test button in the Telegram agent configuration page and it worked.

    How to retrieve chatid How to obtain Telegram chat_id for a specific user? - Stack Overflow

    How to retrieve token : https://core.telegram.org/bots#generating-an-authorization-token

     

    Genius thank you! It's Nov 2022 and this still is required.