Jump to content

Michael_P

Members
  • Posts

    680
  • Joined

  • Last visited

Posts posted by Michael_P

  1. 14 hours ago, JorgeB said:

    This is not normal.

     

    14 hours ago, carotna said:

    Thank you, will try the half-half method.

     

    Start with the container using this IP, it's the one opening a ton of ports

     

    -container-ip 172.18.0.11 

     

    • Like 1
  2. 1 hour ago, John321 said:

    Any other suggestions or ideas where to have a look on

    The reaper is killing the same process, but it doesn't look like it's using a terribly large amount of RAM at the time. If it happens during backup, disable dockers and plugins one at a time until you find the culprit.

     

    Also, make sure whatever backup process you're using isn't using RAM as a temporary filesystem

  3. On 5/17/2024 at 8:09 PM, ruohki said:

    I have no influence on that. The storage is supplied as is, with the promise: we wont look at the data. Thats why i want to encrypt/decrypt files on the unraid side

     

    Then you'll need to store it as an encrypted blob on the remote server - look into Veracrypt

  4. 9 hours ago, ruohki said:

    Is it possible to mount a remote share in a way that files are encrypted on the remote share but visible as decrypted to unraid?

     

    Use an encrypted FS on the remote share's disk, anything written to it will be encrypted

  5. 11 hours ago, IaMs12 said:

    Then leave the failing drive in the array till it goes out completely.

     

    A flaky drive shouldn't be used in the array, as each disk is needed to rebuild it if another drive should bow out. If you're only running 1 parity, and you want to increase its size, I'd go with adding a new parity drive, rebuilding parity, then replace the failing disk. And do it all in maintenance mode to preserve parity if it goes south - so you can re-add the old parity drive and re-build the array.

     

    In any case, 1 error would lead me to toss the drive, just isn't worth it.

  6. 7 hours ago, seecs2011 said:

    Adding anonymized diagnostic data here for review, sent a ticket request directly to unraid

    tower-diagnostics-20240508-2253.zip 169.42 kB · 1 download

     

    Looks like your VPN details may be in plain text (I've obfuscated it below), wonder if @limetech is going to get that sorted in the next release. For now, you should remove it from your post

     

    @JorgeB

     

     

    root       566  0.0  0.0  23824 12724 ?        S    22:53   0:00          |   \_ /usr/bin/openvpn --reneg-sec 0 --mute-replay-warnings --auth-nocache --setenv VPN_PROV protonvpn --setenv VPN_CLIENT openvpn --setenv DEBUG false --setenv VPN_DEVICE_TYPE tun0 --setenv VPN_ENABLED yes --setenv VPN_REMOTE_SERVER us-chicago.privacy.network --setenv APPLICATION qbittorrent --script-security 2 --writepid /root/openvpn.pid --remap-usr1 SIGHUP --log-append /dev/stdout --pull-filter ignore up --pull-filter ignore down --pull-filter ignore route-ipv6 --pull-filter ignore ifconfig-ipv6 --pull-filter ignore tun-ipv6 --pull-filter ignore dhcp-option DNS6 --pull-filter ignore persist-tun --pull-filter ignore reneg-sec --up /root/openvpnup.sh --up-delay --up-restart --keepalive 10 60 --setenv STRICT_PORT_FORWARD yes --setenv VPN_USER YWQpRx******** --setenv VPN_PASS SBKmfs********** --down /root/openvpndown.sh --disable-occ --auth-user-pass credentials.conf --cd /config/openvpn --config /config/openvpn/us_chicago.ovpn --remote ******* 1198 udp --remote ******* 1198 udp --remote ****** 1198 udp --remote-random

     

  7. Just now, droopie said:

    any suggestions on what to do next? 

     

    If you're limiting it in the container settings, it didn't work :)  The only other thing is to figure out why it's using so much, bad config or bad install. You can blow it up and install from scratch to see if that does it.

  8. 6 minutes ago, bmartino1 said:

    Binhex vpn.

     

     

    There may be a log or memory leak that shows. can a client running this go to /Tools/Diagnostics

     

    Tools > Diagnositc and download there log the in the zip file go to 

    system/ps.txt

     

    then do a search for their password to confirm this memory leak?

     

    I couldn't reporduce.

     

     

    Here's on in this thread - system/ps.txt shows their user name and password in plain text

     

     

     

     

×
×
  • Create New...