Jump to content

outsider

Members
  • Posts

    148
  • Joined

  • Last visited

Converted

  • Gender
    Undisclosed

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

outsider's Achievements

Apprentice

Apprentice (3/14)

3

Reputation

  1. outsider

    New docs wiki

    The new docs wiki is looking great! What framework was used to create them? I'm looking to create a similar wiki for my site, and would like to use the same framework.
  2. I got it working. It was the permissions. Need to make sure 0770 is set for permission and user:group is set to 33:33 (which translates to sshd:sshd). Though for some strange reason both the permissions and user:group seem to get reset every so often to 0777 and nobody:users (which seems to be the UnRaid defaults). Anyone know why this permissions reset happens?
  3. I'm getting errors after the log says that Nextcloud was successfully installed. Anyone figure out how to solve this? i've tried several times, and get the same error. I've also followed the instructions here on how to properly reset an instance, but to no avail. nc: getaddrinfo: Name does not resolve Waiting for database to start... + '[' -f /dev-dri-group-was-added ']' ++ find /dev -maxdepth 1 -mindepth 1 -name dri + '[' -n '' ']' + set +x Installing imagemagick via apk... Enabling Imagick... Configuring Redis as session handler... Setting php max children... Initializing nextcloud 25.0.3.2 ... Initializing finished New nextcloud instance Installing with PostgreSQL database starting nextcloud installation Nextcloud was successfully installed Install errors: {"reqId":"11Gx1vlZSeXu8UUsqeos","level":3,"time":"2023-02-06T17:06:05+00:00","remoteAddr":"","user":"admin","app":"PHP","method":"","url":"--","message":"exif_read_data(): File not supported at /var/www/html/lib/private/Metadata/Provider/ExifProvider.php#59","userAgent":"--","version":"25.0.3.2","exception":{"Exception":"Error","Message":"exif_read_data(): File not supported at /var/www/html/lib/private/Metadata/Provider/ExifProvider.php#59","Code":0,"Trace":[{"function":"onError","class":"OC\\Log\\ErrorHandler","type":"::","args":[2,"exif_read_data(): File not supported","/var/www/html/lib/private/Metadata/Provider/ExifProvider.php",59]},{"file":"/var/www/html/lib/private/Metadata/Provider/ExifProvider.php","line":59,"function":"exif_read_data","args":[null,"ANY_TAG",true]},{"file":"/var/www/html/lib/private/Metadata/MetadataManager.php","line":68,"function":"execute","class":"OC\\Metadata\\Provider\\ExifProvider","type":"->","args":[{"__class__":"OC\\Files\\Node\\File"}]},{"file":"/var/www/html/lib/private/Metadata/FileEventListener.php","line":101,"function":"generateMetadata","class":"OC\\Metadata\\MetadataManager","type":"->","args":[{"__class__":"OC\\Files\\Node\\File"},"*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/EventDispatcher/ServiceEventListener.php","line":87,"function":"handle","class":"OC\\Metadata\\FileEventListener","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/3rdparty/symfony/event-dispatcher/EventDispatcher.php","line":251,"function":"__invoke","class":"OC\\EventDispatcher\\ServiceEventListener","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"},"OCP\\Files\\Events\\Node\\NodeWrittenEvent",{"__class__":"Symfony\\Component\\EventDispatcher\\EventDispatcher"}]},{"file":"/var/www/html/3rdparty/symfony/event-dispatcher/EventDispatcher.php","line":73,"function":"callListeners","class":"Symfony\\Component\\EventDispatcher\\EventDispatcher","type":"->","args":[[{"__class__":"Closure"}],"OCP\\Files\\Events\\Node\\NodeWrittenEvent",{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/lib/private/EventDispatcher/EventDispatcher.php","line":88,"function":"dispatch","class":"Symfony\\Component\\EventDispatcher\\EventDispatcher","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"},"OCP\\Files\\Events\\Node\\NodeWrittenEvent"]},{"file":"/var/www/html/lib/private/EventDispatcher/EventDispatcher.php","line":100,"function":"dispatch","class":"OC\\EventDispatcher\\EventDispatcher","type":"->","args":["OCP\\Files\\Events\\Node\\NodeWrittenEvent",{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/lib/private/Files/Node/HookConnector.php","line":118,"function":"dispatchTyped","class":"OC\\EventDispatcher\\EventDispatcher","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/lib/private/legacy/OC_Hook.php","line":106,"function":"postWrite","class":"OC\\Files\\Node\\HookConnector","type":"->","args":[["/Nextcloud.png"]]},{"file":"/var/www/html/lib/private/Files/View.php","line":641,"function":"emit","class":"OC_Hook","type":"::","args":["OC_Filesystem","post_write",["/Nextcloud.png"]]},{"file":"/var/www/html/lib/private/Files/View.php","line":692,"function":"emit_file_hooks_post","class":"OC\\Files\\View","type":"->","args":[true,"/admin/files/Nextcloud.png"]},{"file":"/var/www/html/lib/private/Files/Node/File.php","line":71,"function":"file_put_contents","class":"OC\\Files\\View","type":"->","args":["/admin/files/Nextcloud.png",null]},{"file":"/var/www/html/lib/private/legacy/OC_Util.php","line":257,"function":"putContent","class":"OC\\Files\\Node\\File","type":"->","args":[null]},{"file":"/var/www/html/lib/private/legacy/OC_Util.php","line":216,"function":"copyr","class":"OC_Util","type":"::","args":["/var/www/html/core/skeleton",{"__class__":"OC\\Files\\Node\\Folder"}]},{"file":"/var/www/html/lib/private/User/Session.php","line":553,"function":"copySkeleton","class":"OC_Util","type":"::","args":["*** sensitive parameters replaced ***",{"__class__":"OC\\Files\\Node\\Folder"}]},{"file":"/var/www/html/lib/private/User/Session.php","line":403,"function":"prepareUserLogin","class":"OC\\User\\Session","type":"->","args":[true,"*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/User/Session.php","line":616,"function":"completeLogin","class":"OC\\User\\Session","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/User/Session.php","line":355,"function":"loginWithPassword","class":"OC\\User\\Session","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/Setup.php","line":433,"function":"login","class":"OC\\User\\Session","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/core/Command/Maintenance/Install.php","line":105,"function":"install","class":"OC\\Setup","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/3rdparty/symfony/console/Command/Command.php","line":255,"function":"execute","class":"OC\\Core\\Command\\Maintenance\\Install","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/3rdparty/symfony/console/Application.php","line":1009,"function":"run","class":"Symfony\\Component\\Console\\Command\\Command","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/3rdparty/symfony/console/Application.php","line":273,"function":"doRunCommand","class":"Symfony\\Component\\Console\\Application","type":"->","args":[{"__class__":"OC\\Core\\Command\\Maintenance\\Install"},{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/3rdparty/symfony/console/Application.php","line":149,"function":"doRun","class":"Symfony\\Component\\Console\\Application","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/lib/private/Console/Application.php","line":213,"function":"run","class":"Symfony\\Component\\Console\\Application","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/console.php","line":100,"function":"run","class":"OC\\Console\\Application","type":"->","args":[]},{"file":"/var/www/html/occ","line":11,"args":["/var/www/html/console.php"],"function":"require_once"}],"File":"/var/www/html/lib/private/Log/ErrorHandler.php","Line":92,"CustomMessage":"--"}} Applying default settings... Your data directory is readable by other users. Please change the permissions to 0770 so that the directory cannot be listed by other users. An unhandled exception has been thrown: Exception: Environment not properly prepared. in /var/www/html/lib/private/Console/Application.php:166 ace: #0 /var/www/html/console.php(99): OC\Console\Application->loadCommands(Object(Symfony\Component\Console\Input\ArgvInput), Object(Symfony\Component\Console\Output\ConsoleOutput)) #1 /var/www/html/occ(11): require_once('/var/www/html/c...') #2 {main}Your data directory is readable by other users. Please change the permissions to 0770 so that the directory cannot be listed by other users. An unhandled exception has been thrown: Exception: Environment not properly prepared. in /var/www/html/lib/private/Console/Application.php:166 ace: #0 /var/www/html/console.php(99): OC\Console\Application->loadCommands(Object(Symfony\Component\Console\Input\ArgvInput), Object(Symfony\Component\Console\Output\ConsoleOutput)) #1 /var/www/html/occ(11): require_once('/var/www/html/c...') #2 {main}Your data directory is readable by other users. Please change the permissions to 0770 so that the directory cannot be listed by other users.
  4. Found a solution on the Install section of the github page. Point 9 & 10. https://github.com/JonathanTreffler/backblaze-personal-wine-container#installation It appears that you have to add Drive D to wine manually. Seems to work now.
  5. Anyone here using the `Backblaze_Personal_backup` container? I'm supposed to see a "Drive D" in the Backblaze software (this should point to the storage array) but I don't see a "Drive D" I see Drive C and Z. Drive C is the wine emulated drive C contents, and drive Z is the root of the docker container. Am I missing something?
  6. With the release of v6.1.9 of UnRAID, I get a message that Open VM tools is not compatible with kernel 4.1.18 Does Zeron know of this?
  7. There already exists a AVG AntiVirus scanner inside a docker container https://hub.docker.com/r/blacktop/avg/ and ClamAV also has a few docker containers already made https://www.google.ca/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=clamav%20docker Can someone with more docker knowledge then myself create an UnRAID friendly docker of either those containers?
  8. I was looking into the Synolgy RAID systems and they have an antivirus scanner to check the data on the array at scheduled intervals. The virus scanner they use is ClamAV so I guess it can be used to check more then just emails. They also have a McAfee virus scan... I didn't know McAfee has a linux version of their scanning software. https://www.synology.com/en-us/dsm/app_packages/all_app Anyone else interested in having a virus scanner (even if it only scans for windows viruses) docker running on their system? Let's show johnodon that there is some interest for such a tool.
  9. Exactly. I'm not worried about UnRAID getting a virus. It's the storage that it provides what I want to keep clean since it is accessed mainly by other windows boxes which can easily get infected. I don't need the entire unraid archive to be continually scanned. Just an incoming folder where data gets dropped of by various people.
  10. Are there any plugins or docker containers that provide the functionality of a virus scanner to that checks all new downloaded files added to a certain directory? I searched in the "Community Applications" plugin from withing UnRAID, but nothing came up, so I thought I'd ask. I'd like to set something up which virus checks every file that gets dumped in the incoming folder but the several users in the household. Is there something available that does this for UnRAID?
  11. I've noticed some weird behavior with the "CrashPlan-desktop" docker file. If the "CrashPlan-desktop" is running while there is a sudden loss of power to the unraid system, I can't rdp back into it when the system boots up again. I have to uninstall the "CrashPlan-desktop" image, and re-install it to get rdp access working again. Is there something else I can be doing to the "CrashPlan-docker" image to FIX things rather then just reload/reinstall the image file?
  12. I found the "my.service.xml" file in the conf folder of the crashplan container, but I can't find the "ui.info" file? Where is the "ui.info" file located?
×
×
  • Create New...