Googling brings up this: https://til.codes/how-to-fix-e…ed-storage-engine-innodb/
Be sure to take backups before changing anything
Googling brings up this: https://til.codes/how-to-fix-e…ed-storage-engine-innodb/
Be sure to take backups before changing anything
Any clue?
Not without further information. What does the mariadb-container log say?
You could also switch back to the linuxserver images. They seem again support armhf again.
Last night I started running Nextcloud for a bit, and I realized that this setting is not optimal at all. When I configure the client for the smartphone I have to choose between local IP or WAN domain. This is a problem, if I choose one I don't have the other.
I will have to keep looking around to see how to solve it. At the moment I can only think of a DNS server, but ... is it necessary that much?
Accessing the WAN domain does not work from your home LAN? Maybe you need a new router.
Root drive maybe full?
Why? Can you show me a vulnerability for patch openssh with password auth disabled? Adding a vpn is just another step. Plus, I'm not allowed to use vpn clients on my computers at work. So, if I want to login to my system at home to fix something, I just need putty. If you need to access more than ssh, vpn is the right way to go. But for just ssh, vpn is not needed on a properly setup system. I've had ssh exposed to the internet for almost 20 years and never had an issue.
I agree. It depends on the use case and the environment you are working in
ssh on a non-standard port with password auth disabled is just as secure if not more. I say more because openssh has been around a lot longer than Wireguard and has a proven history of being secure.
Why not a combination of both?!
Why not just a VPN connection to your lan, like WireGuard, for ssh access?
soll ich jetzt 80 extern und 82 intern
Nein bei duckdns validation ist port 80 nicht vonnöten.
Does this occur only when using portainer? Or with docker compose on cli as well?
Moin, das der Container mit einem macvlan läuft ist er von dem host nicht zu erreichen. Ist einfach eine technische Limitation. Aber ich denke dein OMV Server muss nicht zwingend durch einen Werbeblock. Daher wäre es das einfachste in OMV einen öffentlichen DNS Server einzustellen.
You could also use a spare RPi
Did you see the other missing comma in soma’s post?
My root domain is also not showing the park page. Dunno...
Essentially, your config folder and data folder are in the same directory (yes you used a subdirectory... but that is the only difference between yours and mine)
Put your Data directory in another directory, rather than a subdirectory of config.
That's not it. I use this folder structure without any problems.
Your config.php is missing a , at the end of this line:
1 => 'nextcloud.xxxxxx.duckdns.org'
Not sure if that changes anything.
Your swag container works. Thats confirmed by the successful certs.
Please post your nextcloud.subdomain.conf
This is a good resource for the swag container https://docs.linuxserver.io/general/swag
Just for completeness. You don’t need the resolver line in your conf file. This line is needed for the docker dns resolution. But since you are hard coding the ip, it’s not necessary.
Maybe this is a useful if you want to juggle different networks in a compose file:
Inspired by this thread I continued a project, which I had on my list for some time now. I wanted to put all my docker containers into a single docker-compose file. Just for inspiration these are my docker-compose.yml and my .env. All I need to do is run a docker-compose up -d in the folder containing both files.
Code: .envUID=1000 GID=100 TZ=Europe/Berlin APPDIR=/srv/dev-disk-by-label-ssd/appdata BACKUPDIR=/srv/dev-disk-by-label-ssd/backup SYNCDIR=/srv/dev-disk-by-label-ssd/sync RESTART=unless-stopped
Code: docker-compose.ymlDisplay Moreversion: "2.3" services: ################################# #PIHOLE # # pihole: container_name: pihole image: pihole/pihole:latest ports: - "53:53/tcp" - "53:53/udp" - "67:67/udp" - "80:80/tcp" - "443:443/tcp" environment: TZ: '${TZ}' WEBPASSWORD: 'myPW' ServerIP: '192.168.188.201' IPv6: 'false' DNS1: '1.1.1.1' DNS2: 'no' volumes: - ${APPDIR}/pihole:/etc/pihole/ - ${APPDIR}/pihole/dnsmasq:/etc/dnsmasq.d/ dns: - 127.0.0.1 # cap_add: # - NET_ADMIN restart: ${RESTART} networks: pihole: ipv4_address: 192.168.188.201 ################################# #BITWARDEN # # bitwarden: image: bitwardenrs/server:raspberry container_name: bitwarden volumes: - ${APPDIR}/bitwarden:/data - ${APPDIR}/letsencrypt/log/bitwarden:/log #Logfile is mounted to swag container for fail2ban environment: WEBSOCKET_ENABLED: 'true' # Required to use websockets ADMIN_TOKEN: 'mytoken' LOG_FILE: 'log/bitwarden.log' LOG_LEVEL: 'warn' EXTENDED_LOGGING: 'true' TZ: '${TZ}' restart: ${RESTART} networks: my-net: bw_backup: image: bruceforce/bw_backup:rpi3 container_name: bw_backup restart: ${RESTART} depends_on: - bitwarden volumes: - ${APPDIR}/bitwarden:/data/ - /etc/timezone:/etc/timezone:ro - /etc/localtime:/etc/localtime:ro - ${BACKUPDIR}/bitwarden:/backup_folder/ #This is where the db-backup is stored environment: - DB_FILE=/data/db.sqlite3 - BACKUP_FILE=/backup_folder/backup.sqlite3 - CRON_TIME=30 2 * * * - TIMESTAMP=true - DELETE_AFTER=30 - UID=0 - GID=0 - TZ=${TZ} network_mode: "none" ################################# #LETSENCRYPT - SWAG # # swag: image: linuxserver/swag container_name: swag cap_add: - NET_ADMIN environment: - PUID=${UID} - PGID=${GID} - TZ=${TZ} - URL=mydomain - SUBDOMAINS=mysubdomains - VALIDATION=http - EMAIL=myemail volumes: - ${APPDIR}/letsencrypt:/config ports: - 450:443 - 90:80 restart: ${RESTART} networks: my-net: ################################# #NEXTCLOUDPI # # nextcloudpi: image: ownyourbits/nextcloudpi-armhf command: "url_of_my_ncp" container_name: nextcloudpi ports: - "4443:4443" volumes: - ${APPDIR}/nextcloudpi:/data - /etc/localtime:/etc/localtime:ro - ${SYNCDIR}:/mnt/sync #This folder is mounted as an external storage - ${BACKUPDIR}/calcardbackup:/ccb #Backups of my calendar and contacts via calcardbackup - ${BACKUPDIR}/ncp_backup:/ncp_backup #Location where the ncp-backups are stored restart: ${RESTART} networks: my-net: ################################# #RESILIO_SYNC # # resilio-sync: image: linuxserver/resilio-sync container_name: resilio-sync environment: - PUID=33 - PGID=33 - TZ=${TZ} - UMASK_SET=000 volumes: - ${APPDIR}/resilio-sync:/config - ${APPDIR}/resilio-sync/downloads:/downloads - ${SYNCDIR}:/sync ports: - 8888:8888 - 55555:55555 logging: options: max-size: "50m" max-file: "1" restart: ${RESTART} network_mode: "bridge" ################################# #PORTAINER # # portainer: image: portainer/portainer container_name: portainer command: -H unix:///var/run/docker.sock restart: always ports: - 9000:9000 - 8000:8000 volumes: - /var/run/docker.sock:/var/run/docker.sock - ${APPDIR}/portainer:/data networks: pihole: driver: macvlan driver_opts: parent: enx001e063676f8 ipam: driver: default config: - subnet: 192.168.188.0/24 gateway: 192.168.188.1 ip-range: 192.168.188.201/32 my-net: name: my-net