dsmith44

Community Developer
  • Posts

    157
  • Joined

  • Last visited

Everything posted by dsmith44

  1. This is the support thread for the docker container not the plugin. I think you want to be here http:// /topic/136889-plugin-tailscale/
  2. At this point @plantsandbinary I would stop using this and install the plugin instead. This is really for special used cases using docker and private networks only now. I would also try using ip addresses only to exclude dns issues in the first instance for troubleshooting. Sent from my iPad using Tapatalk
  3. 1.54.1 has been pushed and latest updated to this version
  4. 1.52.1 has been pushed. Latest to be tagged later. Sent from my iPad using Tapatalk
  5. Please use the plugin. This is only for use in specialist cases now. However there is nothing to automatically log you in provided by tailscale so issue will be elsewhere.
  6. 1.48.1 has been pushed, latest will be tagged in a week or so
  7. Hi. I have updated the top of this post to indicate that people should now use the plugin in almost all circumstances. It's just a better user experience for most use cases. I will continue to update this for at least the next six months, and longer of people are using it for reasons that the plugin cannot support such as private docker networks. If you are using it for something else please do let me know in advance. Also if anyone else wants to jump in to help, it's super simple, please let me know. At this point I will not answer any support questions for access to unraid over this container, please use the plugin, it's better, even I'm using it. Well I may asnwer them, just to point people to the plugin. I'd like to thans all those that have helped support people since I set this up, which was initially just because I wanted tailsacle for myself, I wasn't expecting so many people to use it.
  8. Let's clear a couple of things up. I have never provided the support for this really, I did this to scratch my own itch when there was no tailscale for unraid. I will continue to update this while it is used. So I haven't changed what I'm doing, I've only ever updated versions. Other kind folk have supported people using it, with occasional input from me if I have time. Now that there is a plugin you are totally within you rights to use that, and indeed I will likely be updating the front page of this to suggest that unless you are using tailscale to do funky fun things with groups of docker containers you probably should.
  9. 1.44.2 and 1.46.0 are now available latest is pointing at 1.44.2 for now
  10. I am also seeing this issue, I've switched to ipvlan but in the past needed macvlan for some reasons, so will need to audit my many containers as to why. diagnostics attached, kernel panic below Hopefully upstream fix will appear in next release anyway. 4 xt_addrtype br_netfilter md_mod zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) jc42 regmap_i2c w83795 tcp_diag inet_dia g ip6table_filter ip6_tables iptable_filter ip_tables x_tables 8021q garp mrp br idge stp llc bonding tls e1000e x86_pkg_temp_thermal intel_powerclamp coretemp k vm_intel nvidia_drm(PO) nvidia_modeset(PO) kvm crct10dif_pclmul crc32_pclmul crc 32c_intel ghash_clmulni_intel sha512_ssse3 aesni_intel ast drm_vram_helper i2c_a lgo_bit crypto_simd drm_ttm_helper cryptd nvidia(PO) ttm Jun 27 21:01:58 unraid kernel: rapl drm_kms_helper ipmi_ssif intel_cstate drm mp t3sas i2c_i801 agpgart i2c_smbus ahci raid_class i2c_core libahci intel_uncore a cpi_ipmi video syscopyarea input_leds sysfillrect joydev led_class sysimgblt wmi scsi_transport_sas fb_sys_fops fan thermal ipmi_si backlight button unix [last unloaded: e1000e] Jun 27 21:01:58 unraid kernel: CPU: 3 PID: 31345 Comm: kworker/u16:2 Tainted: P W O 6.1.34-Unraid #1 Jun 27 21:01:58 unraid kernel: Hardware name: TYAN S5512/S5512, BIOS V2.05 08/23 /2013 Jun 27 21:01:58 unraid kernel: Workqueue: events_unbound macvlan_process_broadca st [macvlan] Jun 27 21:01:58 unraid kernel: RIP: 0010:nf_nat_setup_info+0x8c/0x7d1 [nf_nat] Jun 27 21:01:58 unraid kernel: Code: a8 80 75 26 48 8d 73 58 48 8d 7c 24 20 e8 1 8 db fc ff 48 8d 43 0c 4c 8b bb 88 00 00 00 48 89 44 24 18 eb 54 0f ba e0 08 73 07 <0f> 0b e9 75 06 00 00 48 8d 73 58 48 8d 7c 24 20 e8 eb da fc ff 48 Jun 27 21:01:58 unraid kernel: RSP: 0018:ffffc90000164c78 EFLAGS: 00010282 Jun 27 21:01:58 unraid kernel: RAX: 0000000000000180 RBX: ffff8886f9d07400 RCX: ffff888105f9d9c0 Jun 27 21:01:58 unraid kernel: RDX: 0000000000000000 RSI: ffffc90000164d5c RDI: ffff8886f9d07400 Jun 27 21:01:58 unraid kernel: RBP: ffffc90000164d40 R08: 00000000151aa8c0 R09: 0000000000000000 Jun 27 21:01:58 unraid kernel: R10: 0000000000000098 R11: 0000000000000000 R12: ffffc90000164d5c Jun 27 21:01:58 unraid kernel: R13: 0000000000000000 R14: ffffc90000164e40 R15: 0000000000000001 Jun 27 21:01:58 unraid kernel: FS: 0000000000000000(0000) GS:ffff88880fcc0000(0000) knlGS:0000000000000000 Jun 27 21:01:58 unraid kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033Jun 27 21:01:58 unraid kernel: CR2: 0000 01d23031f9c0 CR3: 000000000220a001 CR4: 00000000001726e0 Jun 27 21:01:58 unraid kernel: Call Trace: Jun 27 21:01:58 unraid kernel: <IRQ> Jun 27 21:01:58 unraid kernel: ? __warn+0xab/0x122 Jun 27 21:01:58 unraid kernel: ? report_bug+0x109/0x17e Jun 27 21:01:58 unraid kernel: ? nf_nat_setup_info+0x8c/0x7d1 [nf_nat] Jun 27 21:01:58 unraid kernel: ? handle_bug+0x41/0x6f Jun 27 21:01:58 unraid kernel: ? exc_invalid_op+0x13/0x60 Jun 27 21:01:58 unraid kernel: ? asm_exc_invalid_op+0x16/0x20 Jun 27 21:01:58 unraid kernel: ? nf_nat_setup_info+0x8c/0x7d1 [nf_nat] Jun 27 21:01:58 unraid kernel: ? nf_nat_setup_info+0x44/0x7d1 [nf_nat] Jun 27 21:01:58 unraid kernel: ? percpu_counter_add_batch+0x85/0xa2 Jun 27 21:01:58 unraid kernel: ? xt_write_recseq_end+0xf/0x1c [ip_tables] Jun 27 21:01:58 unraid kernel: ? __local_bh_enable_ip+0x56/0x6b Jun 27 21:01:58 unraid kernel: ? ipt_do_table+0x57a/0x5bf [ip_tables] Jun 27 21:01:58 unraid kernel: ? rt_dst_alloc+0x2f/0xa0 Jun 27 21:01:58 unraid kernel: ? xt_write_recseq_end+0xf/0x1c [ip_tables] Jun 27 21:01:58 unraid kernel: __nf_nat_alloc_null_binding+0x66/0x81 [nf_nat] Jun 27 21:01:58 unraid kernel: nf_nat_inet_fn+0xc0/0x1a8 [nf_nat] Jun 27 21:01:58 unraid kernel: nf_nat_ipv4_local_in+0x2a/0xaa [nf_nat] Jun 27 21:01:58 unraid kernel: nf_hook_slow+0x3d/0x96 Jun 27 21:01:58 unraid kernel: ? ip_protocol_deliver_rcu+0x164/0x164 Jun 27 21:01:58 unraid kernel: NF_HOOK.constprop.0+0x79/0xd9 Jun 27 21:01:58 unraid kernel: ? ip_protocol_deliver_rcu+0x164/0x164 Jun 27 21:01:58 unraid kernel: __netif_receive_skb_one_core+0x77/0x9c Jun 27 21:01:58 unraid kernel: process_backlog+0x8c/0x116 Jun 27 21:01:58 unraid kernel: __napi_poll.constprop.0+0x2b/0x124 Jun 27 21:01:58 unraid kernel: net_rx_action+0x159/0x24f Jun 27 21:01:58 unraid kernel: __do_softirq+0x129/0x288 Jun 27 21:01:58 unraid kernel: do_softirq+0x7f/0xab Jun 27 21:01:58 unraid kernel: </IRQ> Jun 27 21:01:58 unraid kernel: <TASK> Jun 27 21:01:58 unraid kernel: __local_bh_enable_ip+0x4c/0x6b Jun 27 21:01:58 unraid kernel: netif_rx+0x52/0x5a Jun 27 21:01:58 unraid kernel: macvlan_broadcast+0x10a/0x150 [macvlan] Jun 27 21:01:58 unraid kernel: ? _raw_spin_unlock+0x14/0x29 Jun 27 21:01:58 unraid kernel: macvlan_process_broadcast+0xbc/0x12f [macvlan] Jun 27 21:01:58 unraid kernel: process_one_work+0x1ab/0x295 Jun 27 21:01:58 unraid kernel: __local_bh_enable_ip+0x4c/0x6b Jun 27 21:01:58 unraid kernel: netif_rx+0x52/0x5a Jun 27 21:01:58 unraid kernel: macvlan_broadcast+0x10a/0x150 [macvlan] Jun 27 21:01:58 unraid kernel: ? _raw_spin_unlock+0x14/0x29 Jun 27 21:01:58 unraid kernel: macvlan_process_broadcast+0xbc/0x12f [macvlan] Jun 27 21:01:58 unraid kernel: process_one_work+0x1ab/0x295 Jun 27 21:01:58 unraid kernel: worker_thread+0x18b/0x244 Jun 27 21:01:58 unraid kernel: ? rescuer_thread+0x281/0x281 Jun 27 21:01:58 unraid kernel: kthread+0xe7/0xef Jun 27 21:01:58 unraid kernel: ? kthread_complete_and_exit+0x1b/0x1b Jun 27 21:01:58 unraid kernel: ret_from_fork+0x22/0x30 Jun 27 21:01:58 unraid kernel: </TASK> Jun 27 21:01:58 unraid kernel: ---[ end trace 0000000000000000 ]--- Jun 27 21:30:10 unraid kernel: w83795 0-002f: Failed to read from register 0x045 , err -6 Jun 27 21:30:10 unraid kernel: w83795 0-002f: Failed to read from register 0x046 , err -6 Jun 27 23:12:25 unraid kernel: w83795 0-002f: Failed to read from register 0x03c , err -6 Jun 27 23:28:25 unraid kernel: w83795 0-002f: Failed to write to register 0x040, err -6 Jun 27 23:31:03 unraid emhttpd: spinning down /dev/sdh Jun 27 23:31:03 unraid emhttpd: spinning down /dev/sdd root@unraid:/var/log# root@unraid:/var/log# logoutl: ? rescuer_thread+0x281/0x281 Jun 27 21:01:58 unraid kernel: kthread+0xe7/0xef unRAID Server OS version: 6.12.1 kthread_complete_and_exit+0x1b/0x1b IPv4 address: 192.168.45.5el: ret_from_fork+0x22/0x30 IPv6 address: fd5e:1ec7:ed26::5/TASK> Jun 27 21:01:58 unraid kernel: ---[ end trace 0000000000000000 ]--- unraid login: general protection fault, probably for non-canonical address 0x53ac800000ffb6: 0000 [#1] PREEMPT SMP PTI CPU: 4 PID: 12374 Comm: syncthing Tainted: P W O 6.1.34-Unraid #1 Hardware name: TYAN S5512/S5512, BIOS V2.05 08/23/2013 RIP: 0010:nf_nat_setup_info+0x14a/0x7d1 [nf_nat] Code: 4c 89 ff e8 1e f8 ff ff 48 8b 15 4a 6a 00 00 89 c0 48 8d 04 c2 4c 8b 30 4d 85 f6 74 2a 49 81 ee 90 00 00 00 eb 21 8a 44 24 46 <41> 38 46 46 74 21 49 8b 96 90 00 00 00 48 85 d2 0f 84 56 ff ff ff RSP: 0018:ffffc90000190738 EFLAGS: 00010202 RAX: ffff88819efad811 RBX: ffff888474ffaa00 RCX: 7e7e335e583c96a0 RDX: 0053ac8000010000 RSI: 7a6714a18c31b51d RDI: 0a7ed134644f0286 RBP: ffffc90000190800 R08: e5ea1da169d7f210 R09: 45036f9824daec14 R10: 95a518213e8535a6 R11: ffffc90000190710 R12: ffffc90000190814 R13: 0000000000000000 R14: 0053ac800000ff70 R15: ffffffff82a11440 FS: 000000c000100090(0000) GS:ffff88880fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000014c8b567e000 CR3: 00000001674e2002 CR4: 00000000001726e0 Call Trace: <IRQ> ? __die_body+0x1a/0x5c ? die_addr+0x38/0x51 ? exc_general_protection+0x30f/0x345 ? asm_exc_general_protection+0x22/0x30 ? nf_nat_setup_info+0x14a/0x7d1 [nf_nat] ? nf_nat_setup_info+0x128/0x7d1 [nf_nat] ? krealloc+0x82/0x93 nf_nat_masquerade_ipv4+0x114/0x13c [nf_nat] masquerade_tg+0x48/0x66 [xt_MASQUERADE] ipt_do_table+0x51e/0x5bf [ip_tables] ? xt_write_recseq_end+0xf/0x1c [ip_tables] ? __local_bh_enable_ip+0x56/0x6b ? ipt_do_table+0x57a/0x5bf [ip_tables] nf_nat_inet_fn+0x126/0x1a8 [nf_nat] nf_nat_ipv4_out+0x15/0x91 [nf_nat] nf_hook_slow+0x3d/0x96 ? __ip_finish_output+0x144/0x144 nf_hook+0xdf/0x110 ? ethnl_put_bitset32+0xc9/0x328 ? __ip_finish_output+0x144/0x144 ip_output+0x78/0x88 ? __ip_finish_output+0x144/0x144 ip_sabotage_in+0x52/0x60 [br_netfilter] nf_hook_slow+0x3d/0x96 ? ip_rcv_finish_core.constprop.0+0x3e8/0x3e8 NF_HOOK.constprop.0+0x79/0xd9 ? ip_rcv_finish_core.constprop.0+0x3e8/0x3e8 __netif_receive_skb_one_core+0x77/0x9c netif_receive_skb+0xbf/0x127 br_handle_frame_finish+0x438/0x472 [bridge] ? br_pass_frame_up+0xdd/0xdd [bridge] br_nf_hook_thresh+0xe5/0x109 [br_netfilter] ? br_pass_frame_up+0xdd/0xdd [bridge] br_nf_pre_routing_finish+0x2c1/0x2ec [br_netfilter] ? br_pass_frame_up+0xdd/0xdd [bridge] ? NF_HOOK.isra.0+0xe4/0x140 [br_netfilter] ? br_nf_hook_thresh+0x109/0x109 [br_netfilter] br_nf_pre_routing+0x236/0x24a [br_netfilter] ? br_nf_hook_thresh+0x109/0x109 [br_netfilter] br_handle_frame+0x27a/0x2e0 [bridge] ? br_pass_frame_up+0xdd/0xdd [bridge] __netif_receive_skb_core.constprop.0+0x4fd/0x6e9 ? rcu_is_cpu_rrupt_from_idle+0x11/0x59 ? rcu_sched_clock_irq+0x9b2/0xa37 __netif_receive_skb_one_core+0x40/0x9c process_backlog+0x8c/0x116 __napi_poll.constprop.0+0x2b/0x124 net_rx_action+0x159/0x24f __do_softirq+0x129/0x288 do_softirq+0x7f/0xab </IRQ> <TASK> __local_bh_enable_ip+0x4c/0x6b ip_finish_output2+0x36a/0x39d ip_send_skb+0x15/0x3b udp_send_skb+0x278/0x2e6 udp_sendmsg+0x756/0x9bd ? ip_neigh_gw4+0x8b/0x8b ? sched_clock_cpu+0x12/0xa1 ? __smp_call_single_queue+0x23/0x35 ? paravirt_write_msr+0xb/0x11 ? ttwu_queue_wakelist+0x9a/0xcf ? _raw_spin_unlock_irqrestore+0x24/0x3a ? try_to_wake_up+0x20e/0x248 ? sock_sendmsg_nosec+0x2b/0x40 sock_sendmsg_nosec+0x2b/0x40 sock_write_iter+0x89/0xb8 vfs_write+0x10f/0x1b9 ksys_write+0x76/0xc2 do_syscall_64+0x6b/0x81 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x40394e Code: 48 89 6c 24 38 48 8d 6c 24 38 e8 0d 00 00 00 48 8b 6c 24 38 48 83 c4 40 c3 cc cc cc 49 89 f2 48 89 fa 48 89 ce 48 89 df 0f 05 <48> 3d 01 f0 ff ff 76 15 48 f7 d8 48 89 c1 48 c7 c0 ff ff ff ff 48 RSP: 002b:000000c0004c4198 EFLAGS: 00000206 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 000000000040394e RDX: 0000000000000037 RSI: 000000c000d5e002 RDI: 0000000000000015 RBP: 000000c0004c41d8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0004c4318 R13: 0000000000000000 R14: 000000c0003fd1e0 R15: 0000148c54fe5928 </TASK> Modules linked in: nvidia_uvm(PO) macvlan xt_mark wireguard curve25519_x86_64 libcurve25519_generic libchacha20poly1305 chacha_x86_64 poly1305_x86_64 ip6_udp_tunnel udp_tunnel libchacha xt_CHECKSUM ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat iptable_mangle vhost_net tun vhost vhost_iotlb tap veth xt_nat xt_tcpudp xt_conntrack xt_MASQUERADE nf_conn track_netlink nfnetlink xfrm_user xfrm_algo iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype br _netfilter md_mod zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) jc42 regmap_i2c w83795 tcp_diag inet_diag ip6table_filter ip6_tables iptable_filter ip_tables x_tables 8021q garp mrp bridge stp llc bon ding tls e1000e x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel nvidia_drm(PO) nvidia_modeset(PO) kvm crct10dif _pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 aesni_intel ast drm_vram_helper i2c_algo_bit crypto_s imd drm_ttm_helper cryptd nvidia(PO) ttm rapl drm_kms_helper ipmi_ssif intel_cstate drm mpt3sas i2c_i801 agpgart i2c_smbus ahci raid_class i2c_co re libahci intel_uncore acpi_ipmi video syscopyarea input_leds sysfillrect joydev led_class sysimgblt wmi scsi_transport _sas fb_sys_fops fan thermal ipmi_si backlight button unix [last unloaded: e1000e] ---[ end trace 0000000000000000 ]--- RIP: 0010:nf_nat_setup_info+0x14a/0x7d1 [nf_nat] Code: 4c 89 ff e8 1e f8 ff ff 48 8b 15 4a 6a 00 00 89 c0 48 8d 04 c2 4c 8b 30 4d 85 f6 74 2a 49 81 ee 90 00 00 00 eb 21 8a 44 24 46 <41> 38 46 46 74 21 49 8b 96 90 00 00 00 48 85 d2 0f 84 56 ff ff ff RSP: 0018:ffffc90000190738 EFLAGS: 00010202 RAX: ffff88819efad811 RBX: ffff888474ffaa00 RCX: 7e7e335e583c96a0 RDX: 0053ac8000010000 RSI: 7a6714a18c31b51d RDI: 0a7ed134644f0286 RBP: ffffc90000190800 R08: e5ea1da169d7f210 R09: 45036f9824daec14 R10: 95a518213e8535a6 R11: ffffc90000190710 R12: ffffc90000190814 R13: 0000000000000000 R14: 0053ac800000ff70 R15: ffffffff82a11440 FS: 000000c000100090(0000) GS:ffff88880fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000014c8b567e000 CR3: 00000001674e2002 CR4: 00000000001726e0 Kernel panic - not syncing: Fatal exception in interrupt Kernel Offset: disabled ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]--- unraid-diagnostics-20230629-0950.zip
  11. Are you using the plugin or the docker container? You say plug-in. This is for the container not the plug-in
  12. The fact that you can ping your client device tailscale address form unraid, but no vica versa suggest ACLs/firewalls. Have you set any custom ACLs in the tailscale admin interface? Have you done anything to unraid with firewalls?
  13. Please see previous discussions. Latest will not be moved for a few weeks. 1.44 is available if you want to manually pick it.
  14. The advertised-routes option is not officially supported, that is about routing all your traffic back to Unraid before it goes to the internet. So in the first instance I'd remove that from UP_FLAGS until you get basics working. Also Tailscale shouldn't need a port forward. From the device connecting can you ping the tailscle IP address of the unraid server? If you can, then something else is stopping the web interface working. If you can't then can you ping the device from unread?
  15. Hi. At the end of a backup all the files have root:root ownership and permissions of rw-r----- (640). Is this intended as it makes them unreadable to my backup system? I assumeI can fix this with a post run script, but wanted to check if that's the right approach. Thanks
  16. Thank you @chchiyan, not sure what happened there, now fixed.
  17. Yes that does indeed fix the issue, so I got digging. I have DOCKER_OPTS set in /boot/config/docker.cfg as per Removing this and problem is solved, and as I no longer need remote access I'm good, however this will bite others potentially. It's the -H tcp://0.0.0.0:2375 that causes the delay for me, somewhere between 15 and 30s. Thanks
  18. I setup an inotify on /var/run and ran a tail of /var/log/syslog Jun 11 23:06:47 unraid emhttpd: shcmd (362): /etc/rc.d/rc.docker start Jun 11 23:06:47 unraid root: starting dockerd ... /var/run/ CREATE dockerd.pid Jun 11 23:06:47 unraid avahi-daemon[14531]: Server startup complete. Host name is unraid.local. Local service cookie is 39991689. Jun 11 23:06:48 unraid avahi-daemon[14531]: Service "unraid" (/services/ssh.service) successfully established. Jun 11 23:06:48 unraid avahi-daemon[14531]: Service "unraid" (/services/smb.service) successfully established. Jun 11 23:06:48 unraid avahi-daemon[14531]: Service "unraid" (/services/sftp-ssh.service) successfully established. Jun 11 23:07:02 unraid root: Docker not running, can't start containers /var/run/ CREATE docker.sock You can see that the CREATE of docker.sock is after start_containers complains docker isn't running. Looking through rc.docker this puzzles me as wait_daemon is called in start_network so I'm at a bit of a loss