• Content Count

  • Joined

  • Last visited

Community Reputation

21 Good

About Ryonez

  • Rank
  • Birthday April 19


  • Gender

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. @Frank Ruhl Please calm down on the caps, it's considered as shouting and thus rude. Your reply here seems to be about two things. One is the timeframe for getting a replacement key manually. There is a system in place were you can replace a key yourself, but it has a one year cooldown between uses. You've made no mention of weather or not you've even attempted this. If you have, there are suggestions above for using a trial key, which did work for me until my key was replace by the UnRAID team. The second thing seems to be some sort of issue? I recommend making a post in the general
  2. The USB Flash Drive backup lets us keep more control over our backups. Deprecating this in favor of a method that only backups to the cloud is a mistake in my opinion. Would you do the same with appdata if unRaid added an option to backup appdata to their servers? This isn't even accounting for the fact that the backups made by unRaid aren't encrypted currently. I ask you to please reconsider this stance, maintaining the ability to create controlled backups of flash is important.
  3. Maybe this would be better making a support thread for. This one is a feature request thread.
  4. Recently I've noticed that fields I remove from templates have started showing back up, and will continue to return whenever I try to remove them again. How do I prevent this behavior?
  5. Now I've opened my eyes and actually read you post properly, I see that I missed a bit. Sorry about that. Gave that a go and it seems to work. Resetting the configuration is nerve racking though, everything is saying it'll wipe stuff.
  6. Hmm, isn't the key Hmm... Does the trail key have to be online all the time, or just for registration? And could some sort of "emergency key" system be set up? Have it work like a trial, except this requires an old key to be present/given and will only last 7-15 days. Then the old key can be added to the "live" blacklist (prevents multiple emergency keys from being issued), while giving a licence holder the ability to get a server back up asap whille they what for a proper one to be issued. The keys should have the dates they work in them, so it would work for an offline system
  7. Interesting, wasn't aware the blacklist was baked into the system. I wonder if there's a way to still alleviate the issue I'm having without to much disruption to the system in place. Maybe allowing trail keys for existing unraid configurations. I believe it has to ask the unraid servers for a key to be issued, so it shouldn't be to hard to do a check there. Is there a reason for the current prevention there? I'll agree it's outside of a trail scenario, but it would allow us to bring the server back up, for a while. I wouldn't even care if it was for a smaller time frame as long as it'd
  8. That's a brilliant idea, didn't even think of that! I tried, but it's throwing this: `It is not possible to use a Trial key with an existing Unraid OS installation.` So, can't do that.
  9. I've just had a usb key die on me for the second time in the space of a year. The registration system allows for automatic key replacement once a year. If you need more, then you have to contact support. I personally am finding this frustrating right now. I've sent an email, and the form said it could take days. That's days my plex server is down. Days my automation system is down. Days my email server, discord bot that servers several guilds, database systems, wikipedia and notekeeping, git services, everything are all down. And not because I'm waiting on hardware, but because I need to
  10. Is there a way to connect pi-hole to two networks? Atm I have it set up with it's own ip address, however I want to secure the admin interface. I can't do that though because letsencrypt is in a secure docker network for the containers, and just pointing it to pi-hole will send traffic unencrypted over the lan network. I made an issue on the pi-hole docker github regarding this issue here.
  11. Squid is meaning using pi-hole as the DNS server unRaid uses for itself. Though looking at the replies for it I don't get why this is pointed out. I don't use it for my server, and that's because I host it on that server. I might personally try it if it was hosted off the server, but I could see there being issues where it might block something unRaid needs by accident. It's unlikely you'll need to filter the traffic for unRaid though. Pi-hole is fine to use as the DNS server for wireguard, though there's some tweaks you need to do if you're hosting pi-hole on the same unRaid server as
  12. Is it only possible to have one active tunnel at a time? I've been trying to set up a second one to create a game network. I have another one, an admin network that has docker access that's working fine. But this second one I can get the client and server to handshake. Any idea what the issue might be?