L0rdRaiden

Members
  • Posts

    568
  • Joined

  • Last visited

Posts posted by L0rdRaiden

  1. 2 hours ago, Kilrah said:

    Set autostart on the compose stack, not on the containers it creates.

     

    that is exactly the problem, if you use the autostart built in docker compose manager, with some stacks it won't work correctly, don't ask me why.

     

    I'm going to try the script and report back

  2. I have a problem with this compose, If I start the server and docker start automatically the proxy won't work, the dockers runs no apparent error appears but it will return a 404.

     

    If I stop and start the compose it will work at any time, just after a reboot, just after an array stop, at any point in time it will return correctly the app behind traefik.

     

    Any idea why is this and how to troubleshoot it?


     

    ###############################################################
    # Web Proxy DMZ
    ###############################################################
    
    # Common settings #############################################
    
    x-default: &config
      restart: unless-stopped
      cpuset: 10,22,11,23,8,20,9,21
      security_opt:
        - no-new-privileges:true
    x-dns: &dns
      dns:
        - 10.10.50.5
        - 10.10.50.6
    x-labels: &labels
      com.centurylinklabs.watchtower.enable: "true"
      net.unraid.docker.managed: "composeman"
      net.unraid.docker.shell: "sh"
    
    # Services ####################################################
    
    services:
    
    ## Traefik ####################################################
    
      traefik:
        container_name: ProxyDMZ-Traefik
        image: traefik:latest
        <<: [*config, *dns]
        depends_on:
        # - wpsocketproxy:
        # - modsecurity
          - crowdsec
        networks:
        # wp-netsocketproxy:
        # wp-netmodsecurity:
          wp-netredis:
          eth2:
            ipv4_address: ${ProxyDMZTraefik_ip}
        ports:
          - 80:80
          - 443:443
          - 8080:8080 # Dashboard port
        volumes:
          - /mnt/services/docker/WebProxyDMZ/Traefik:/etc/traefik/
        environment:
          - TZ
        # - DOCKER_HOST=wpsocketproxy:2375
          - CF_API_EMAIL_FILE
          - CF_DNS_API_TOKEN_FILE
        secrets:
          - CF_API_EMAIL
          - CF_DNS_API_TOKEN
        labels:
          <<: *labels
          net.unraid.docker.icon: "https://raw.githubusercontent.com/ibracorp/unraid-templates/master/icons/traefik.png"
          net.unraid.docker.webui: "https://traefik.domain.com/dashboard/#/"
    
    ## CrowdSec ###################################################
    
      crowdsec:
        image: crowdsecurity/crowdsec
        container_name: ProxyDMZ-CrowdSec
        <<: [*config, *dns]
        depends_on:
          - redis-cs
        networks:
          eth2:
            ipv4_address: ${ProxyDMZCrowdSec_ip}
        ports:
          - 8080:8080
         #- 6060:6060 # PROMETEUS
        environment:
          TZ:
          COLLECTIONS: "crowdsecurity/traefik crowdsecurity/home-assistant crowdsecurity/http-cve crowdsecurity/whitelist-good-actors"
        # GID: "${GID-1000}"
          PGID:
          PUID:
          CUSTOM_HOSTNAME: CrowdSecDMZ
          DISABLE_LOCAL_API: "false" # True Only after successfully registering and validating remote agent below.
        volumes:
          - /mnt/services/docker/WebProxyDMZ/CrowdSec/data:/var/lib/crowdsec/data
          - /mnt/services/docker/WebProxyDMZ/CrowdSec:/etc/crowdsec
          - /mnt/services/docker/WebProxyDMZ/Traefik/logs:/var/log/traefik:ro
          - /mnt/services/docker/HomeAssistant:/var/log/homeassistant:ro    
        labels:
          <<: *labels
          net.unraid.docker.icon: "https://raw.githubusercontent.com/ibracorp/app-logos/main/crowdsec/crowdsec.png"
    
    ## CrowdSec - Redis ###########################################
    
      redis-cs:
        image: redis:alpine
        container_name: ProxyDMZ-CrowdSec-Redis
        <<: *config
        command: [ "sh", "-c", "exec redis-server --requirepass $REDIS_PASSWORD" ]  # redis-cli -a "password" --stat # select 1 # dbsize
        networks:
          wp-netredis:
        volumes:
          - /mnt/services/docker/WebProxyDMZ/Redis:/data
        environment:
          - TZ
        labels:
          <<: *labels
          net.unraid.docker.icon: "https://raw.githubusercontent.com/A75G/docker-templates/master/templates/icons/redis.png"
    
    
    # Networks ####################################################
    
    networks:
      eth2:
        name: eth2
        external: true
      eth1:
        name: eth1
        external: true
    # wp-netsocketproxy:
    #   internal: true
      wp-netredis:
        internal: true
    # wp-netmodsecurity:
    #   internal: true
    
    # Secrets #####################################################
    
    secrets:
      # Traefik - CF_API_EMAIL
      CF_API_EMAIL:
        file: $SECRETSDIR/CF_API_EMAIL
      # Traefik - CF_API_EMAIL
      CF_DNS_API_TOKEN:
        file: $SECRETSDIR/CF_DNS_API_TOKEN

     

  3. 9 hours ago, bland328 said:

    @bobbintb, did you happen to use any particular guide to accomplish this? Or have one in mind that you recommend? I'm also in need of auditd support, and though I have many years of Linux experience, I have yet to build a custom kernel. Thanks for any advice!

    Someone told me that they might add auditd in 6.13. So I am waiting for it

  4. 2 hours ago, jcbshw said:

    Thanks @mtongnz for the fixes! I am new to Unraid and my biggest annoyances was the docker gui when using compose.

     

    Everything is mostly working as expected. Only my gluetun container keeps showing an update after doing "update stack". All other updates have disappeared.

     

     

    It's a general issue, the integration between compose and docker is not native. I guess unRAID should do some changes to accommodate better docker compose while using compose manager

  5. On 11/27/2023 at 11:46 AM, yolo said:

    is this differ from bridge and host? --dns for bridge, another for host?

    With that settings the docker will use both DNS, it is something "normal" in case 1 fails to add 2 DNS, you can add 1 only and will work as well

  6. 6 hours ago, hrv231 said:

    Hello,

     

    I just want to check if this is normal in this plugin?
    I'm running a normal docker compose to test the plugin.

    Each of my services are running like this, example:
     

    graylog:
    
        networks:
          eth0:
            ipv4_address: 10.10.10.20
    
    networks:
      eth0:
        external: true
        name: eth0

     

    The Docker tab doesn't show the name of my network, instead it shows the id of it.

    I'm using macvlan, "no bridge" and "no bonding"

     

    root@Tower:~# docker network inspect eth0
    [
        {
            "Name": "eth0",
            "Id": "a38b1ae9bf3865b59f1c58c33308a3885528d2d57241ed44fe812caa63aae6d3",
            "Created": "2023-11-18T17:02:18.576907217-08:00",
            "Scope": "local",
            "Driver": "macvlan",
            "EnableIPv6": false,
            "IPAM": {
                "Driver": "default",
                "Options": {},
                "Config": [
                    {

     

    image.png

    I have the same config with the same result. Everything is fine the problem is unRAID compatibility with docker compose to represent the config in the webui

  7. 8 minutes ago, Ademar said:

     

    To make it easy for myself, I set up a dedicated Debian VM where I follow the official "Docker install" procedure.
    https://support.sandflysecurity.com/support/solutions/articles/72000078453-docker-image-install

    https://documentation.wazuh.com/current/deployment-options/docker/wazuh-container.html

    Wazuh AGENT as a docker container sounds like a terrible idea.

    But I understand that wazuh is useless if you can't install wazuh agent directly on unRAID OS, right?

    I will try with sandy first and the once auditd is ready I will integrate the logs in security onion

  8. On 12/3/2023 at 10:26 PM, Ademar said:

    @InfInIty I've tried Sandfly, and that is able to scan Unraid over SSH. Some of the checks it's trying to do can't be completed, possibly due to Docker being used. But it does pass a lot of checks, and fail some. I also see there is an agentless mode to Wazuh, I haven't tried that yet.

     

    Where you have installed sandfly? in a VM? have you encountered any issue during installation or it works fine just by following the documentation?

     

    Wazuh agent over docker is not officially supported, although there are some unofficial images on github.

     

     

    I have been told in private that soon there will be official support for auditd in Unraid, I think this will be the best option to monitor the security, anyway I plan to try sandfly.

  9. @primeval_god

    If I add my the "compose manager" labels to my docker compose file, should I delete the docker-compose.override.yml? is there a way to override this file and use exclusively whatever I set in the compose label?

    imagen.png.35a41f993643a1a921f1033ea16f4ce4.png

     

    I see in some cases inconsistencies where the content of this file does not match the labels defined for it in docker compose.

     

    I am using labels like this

    lables:

          - "com.centurylinklabs.watchtower.enable=true"

          - "net.unraid.docker.managed=composeman"

          - "net.unraid.docker.shell=sh"

          - "net.unraid.docker.icon=https://raw.githubusercontent.com/ibracorp/unraid-templates/master/icons/traefik.png"

          - "net.unraid.docker.webui=https://traefik.dsaasddsa.com.es/dashboard/#/"

  10. 3 hours ago, mans_ said:

    I don't understand why the developers force us on having reliance on other software. Unraid devs simply force us users to using proxmox because there is no native VM backup and snapshot. Multiple unraid array pools is kind of a luxury to have with present options already available but native VM backup and snapshot is a necessity. There is complete lack of ignorance and no proper support for VMs by not giving us native VM backup and snapshot. This is the only reason why people virtulize unraid with proxmox. I love unraid and the thank the devs for their work but I'm deeply disappointed in this aspect. I hope this constructive feedback finds y'all well.

    Or proxmox is forcing me to use unRAID because they don't have native docker support. Although unRAID doesn't support docker compose either

  11. I have 2 samsung 990 pro  nvme that are a few weeks old in a mirror zfs pool.

     

    Now one of them is degraded

     

    The problem started with this log

    Unraid kernel: nvme nvme2: I/O 249 (I/O Cmd) QID 1 timeout, aborting

     

    You can see everything in the diagnostics.

     

    Is really the HW broken? is there a way to recover it if it's not a hw problem?

     

    In scrutiny both drives seems ok

    imagen.thumb.png.5c5a88eb3fbff87621e343ecffbd174b.png

     

    imagen.thumb.png.c5275b8c622a6fa89b85e6eee941681a.png

     

    unraid-diagnostics-20231112-0959.zip

  12. On 11/8/2023 at 9:42 PM, primeval_god said:

    Right but the things it reports arent things that the user can do anything about (unless they are willing to build there own docker images that is). Its primary audience would be the developers who build the images. The majority of unRAID users aren't building their own images, or even getting them from Docker hub i would wager, they are using what is available in CA.

     

     

    Unraid apps catalog contains many dead projects, abandoned images, etc. mainly because you are force to use docker run instead compose so people in the community in many cases have done custom images to overcome unraid's limitations, like when needs more than 1 image to work, any project like this requires a custom unofficial image to be an app in Unraid's catalog.

     

    The reports are useful to understand the vulnerabilities of the images and act about it, you can do a lot, like using another image or not using it at all because is a service that you have published on internet and is vulnerable to a remote attack.

     

  13. 3 hours ago, primeval_god said:

    This looks like a tool for docker images developers. I am not sure of how much utility it would be for unRAID users.

     

    It's a tool that can give you all the vulnerabilities and misconfigurations of the local images.

    Is meant for devs in an enterprise environment because enterprises don't use docker CLI in production or preprod environments but since unRAID does we can use it to have this information about the security vulnerabilities of the images used by the containers.

  14. Docker recently release Docker Scout.

    I think it would be interesting at least to have the scout-cli already included in Unraid by default. An step further would be an additional page in unraid to see a report of the vulnerabilities found, the command line is pretty simple and the output could be easily formated for a web internface.

    https://docs.docker.com/scout/

    https://github.com/docker/scout-cli

    https://docs.docker.com/scout/dashboard (this is only docker hub, doesn't apply just interesting)

     

    @primeval_god I think it might be of your interest since you are already adding the compose packages via plugin, although official support would be ideal

     

     

     

     

  15. On 8/16/2022 at 1:14 PM, JorgeB said:

    Unraid will still boot, just mcelog won't load, the unsupported CPU message is just about that, LT already mentioned that in the future mcelog will be replaced wit rasdemon, that one also supports newer AMD CPUs.

     

    Is this still a problem?

    Nov  5 07:37:19 Unraid root: mcelog: ERROR: AMD Processor family 23: mcelog does not support this processor.  Please use the edac_mce_amd module instead.
    Nov  5 07:37:19 Unraid root: CPU is unsupported

     

    I got this today on 6.12.4

  16. more elegant now with the labels in the compose :)

     

    ###############################################################

    # Adguard Home 6

    ###############################################################

     

    # Common settings #############################################

     

    x-default: &config

      restart: unless-stopped

      cpuset: 12,13,14,15

      security_opt:

        - no-new-privileges:true

      #dns:

      #  - 10.10.50.5

      #  - 10.10.50.6

    x-labels: &labels

      com.centurylinklabs.watchtower.enable: "true"

      net.unraid.docker.managed: "composeman"

      net.unraid.docker.shell: "sh"

      net.unraid.docker.icon: "https://raw.githubusercontent.com/SiwatINC/unraid-ca-repository/master/icons/adguard.png"

     

    # Services ####################################################

     

    services:

     

    # Adguard Home 6 Internal ######################################

     

      adguardhomeint6:

        container_name: AdGuardHomeINT6

        image: adguard/adguardhome

        <<: *config

        networks:

          eth1:

            ipv4_address: 10.10.40.6

        ports:

          - "53:53/tcp" # Plain DNS

          - "53:53/udp" # Plain DNS

        # - "67:67/udp" # DHCP

        # - "68:68/tcp" # DHCP

        # - "68:68/udp" # DHCP

          - "80:80/tcp" # HTTPS/DNS-over-HTTPS server & admin panel

          - "443:443/tcp" # HTTPS/DNS-over-HTTPS server & admin panel

          - "443:443/udp" # HTTPS/DNS-over-HTTPS server & admin panel

          - "3000:3000/tcp" # admin panel

        # - "853:853/tcp" # DNS-over-TLS server

        # - "5443:5443/tcp" # DNSCrypt server

        # - "5443:5443/udp" # DNSCrypt server

        volumes:

          - /mnt/services/docker/AdguardINT6/config:/opt/adguardhome/conf

          - /mnt/services/docker/AdguardINT6/workingdir:/opt/adguardhome/work

        labels:

          <<: *labels

          net.unraid.docker.webui: "http://10.10.40.6:80/"

     

    # Adguard Home 6 DMZ ###########################################

     

      adguardhomedmz6:

        container_name: AdGuardHomeDMZ6

        image: adguard/adguardhome

        <<: *config

        networks:

          eth2:

            ipv4_address: 10.10.50.6

        ports:

          - "53:53/tcp" # Plain DNS

          - "53:53/udp" # Plain DNS

        # - "67:67/udp" # DHCP

        # - "68:68/tcp" # DHCP

        # - "68:68/udp" # DHCP

          - "80:80/tcp" # HTTPS/DNS-over-HTTPS server & admin panel

          - "443:443/tcp" # HTTPS/DNS-over-HTTPS server & admin panel

          - "443:443/udp" # HTTPS/DNS-over-HTTPS server & admin panel

          - "3000:3000/tcp" # admin panel

        # - "853:853/tcp" # DNS-over-TLS server

        # - "5443:5443/tcp" # DNSCrypt server

        # - "5443:5443/udp" # DNSCrypt server

        volumes:

          - /mnt/services/docker/AdguardDMZ6/config:/opt/adguardhome/conf

          - /mnt/services/docker/AdguardDMZ6/workingdir:/opt/adguardhome/work

        labels:

          <<: *labels

          net.unraid.docker.webui: "http://10.10.50.6:80/"

     

    # Networks ####################################################

     

    networks:

      eth1:

        name: eth1

        external: true

      eth2:

        name: eth2

        external: true

    • Like 1
  17. On 6/10/2023 at 7:24 PM, L0rdRaiden said:

    can we get support for auditd?

     

    https://unix.stackexchange.com/questions/502878/slackware-14-2-turn-on-the-auditd-daemon

    https://slackbuilds.org/repository/14.2/system/audit/  a newer version would be better.

    https://slackbuilds.org/repository/15.0/system/audit/

    https://github.com/linux-audit

     

    I think is crucial to be able to monitor Unraid security

     

    Or wazuh agent? not sure if it's compatible but this is the only reference to slackware I have found

    https://github.com/wazuh/wazuh/blob/master/src/init/init.sh

     

     

    Hi @EUGENI_CAT could you please consider this? right now Unraid lacks of any security monitor capabilities and this will open the door to any SIEM or recurity tool to be used to monitor Unraid host.

  18. 2 hours ago, tjb_altf4 said:


    There are SKUs of the mellonox cards that are infiniband only, but don't think there are any in the MCX353A line up.
    You can confirm support in the product manual
    https://network.nvidia.com/pdf/user_manuals/ConnectX-3_VPI_Single_and_Dual_QSFP_Port_Adapter_Card_User_Manual.pdf

    MCX353A working in Jerod's video below (after some troubleshooting)

     

     

    So any melanox card based on QSFP+ will be compatible with Unraid but if it's based on infinitiband I could have problems?

     

    like these would be compatible?

    Mellanox CX314A MCX314A-BCCT ConnectX-3 Pro 40GbE Dual-Port QSFP PCIe Card | eBay

     

    Mellanox ConnectX-3 MCX354A-FCBT CX354A VPI 40/56GbE Dual-Port QSFP Adapter 789398906032 | eBay