Thanks for the hint! Googling docker stats-related problems led me to this solution:
Apparently /boot/firmware/cmdline.txt was missing the setting cgroup_enable=memory.
Now, memory usage shows up on the commandline and through the GUI
Thanks for the hint! Googling docker stats-related problems led me to this solution:
Apparently /boot/firmware/cmdline.txt was missing the setting cgroup_enable=memory.
Now, memory usage shows up on the commandline and through the GUI
Recently, I switched to OMV 7 and I'm very happy with all the enhancements and the stability of the system. The changes to Docker management are also great, namely going with a native plugin. Thank you!
One thing, that currently doesn't work though, is the memory stats in the Compose-plugin Stats section (see below). Is there any further setup needed to see how much memory my containers consume?
I'm running OMV7 on Raspberry Pi OS 64-bit. Reading the memory stats under Diagnostics -> Processes works as expected.
OMV6 is doing this by default if the environment variable OMV_POSTFIX_MAIN_RELAYHOST_MXLOOKUP_ENABLE is set to no (which is the default). See https://github.com/openmediava…tfix/files/main.cf.j2#L36
Thank you for clarifying this!
With help from the Posteo support team (thanks!) I was able to sort out this issue:
mail.posteo.de that was mentioned above was never used as an SMTP relay, it was rather a redirection to posteo.de. This subdomain hasn't been in use for some time now. When using posteo.de instead, Postfix would try an MX lookup and in return receive a timeout for mx0*.posteo.de which is not meant for sending e-mails.
What resolves this issue, is setting posteo.de in square brackets as the SMTP server, thereby disabling MX lookup (see: https://www.postfix.org/postconf.5.html#relayhost).
Sorry for resurrecting this thread but has anyone else started having problems with notifications on "mail.posteo.de" a short while ago?
It was working for years here and suddenly i'm getting refused connections from mail.posteo.de
Just noticed that postfix on OMV 5 has been getting refused connections since late July here as well
Okay, that's good to know! Will migrate to a separate drive, then.
Thank you for all the (quick) support! I am relieved to see that I am able to access everything properly again and that the backups worked. Man lernt nie aus, but hopefully I'll avoid some obvious traps next time
After editing /etc/openmediavault/config.xml I ran omv-salt deploy run fstab to write to fstab. Did reboot twice, adding new stacks after each reboot. Works like a charm!
I'm using ext4 on my drives, the error appeared some time after I had added a new disk and created a MergerFS-fuse (msp-mfs, options: defaults,allow_other,cache.files=off,use_ino)
mount -o remount,exec srv/dev-disk-by-label-<label>/ seems to have solved the issue! No errors while deploying stacks through Portainer.
Thank you for your suggestions!
Why are you making a shared folder on docker folders?
This was the original set-up that worked until recently (but I'm unsure why I created the folder in that way in the first place). When trying out different solutions, I also let the omv-extras Docker interface create this folder, which, as I understand, is the preferred way (besides using docker from the command line). Unfortunately hasn't solved the issue though.
total 52K
drwx--x--- 13 root root 4.0K May 22 23:15 .
drwxr-xr-x 8 root root 4.0K May 22 23:13 ..
drwx--x--x 4 root root 4.0K May 22 23:15 buildkit
drwx--x--- 3 root root 4.0K May 22 23:15 containers
drwx------ 3 root root 4.0K May 22 23:15 image
drwxr-x--- 3 root root 4.0K May 22 23:15 network
drwx--x--- 9 root root 4.0K May 22 23:15 overlay2
drwx------ 4 root root 4.0K May 22 23:15 plugins
drwx------ 2 root root 4.0K May 22 23:15 runtimes
drwx------ 2 root root 4.0K May 22 23:15 swarm
drwx------ 2 root root 4.0K May 22 23:15 tmp
drwx------ 2 root root 4.0K May 22 23:15 trust
drwx-----x 3 root root 4.0K May 22 23:15 volumes
Display More
total 0
drwx------ 8 root root 180 May 22 23:15 .
drwxr-xr-x 30 root root 1160 May 22 23:15 ..
drwxr-xr-x 3 root root 60 May 22 23:15 containerd
drw------- 2 root root 60 May 22 23:15 libnetwork
srwxr-xr-x 1 root root 0 May 22 23:15 metrics.sock
drwxr-xr-x 2 root root 60 May 22 23:15 netns
drwx------ 2 root root 40 Apr 29 19:03 plugins
drwx------ 3 root root 60 Apr 29 19:03 runtime-runc
drwx------ 2 root root 40 Apr 29 19:03 swarm
I didn't dare to try the mount remount solution, didn't want to mess things up further. But if it's unproblematic, I might give it a go
Thank you so far!
After going through steps 1-4, the mentioned error still prevents me from deploying stacks It also persists when deleting the /docker directory in Access Rights Management | Shared Folders, re-adding it through the GUI, as well as trying a new directory with a completely different name.
Could this then be related to something else than directory permission issues? I am certain that I only changed the permissions on /srv/dev-disk-by-label-wdred1/ and not elsewhere.
Why are you creating a symlink from /var/lib/docker ?
You can install Docker and then specify the real Docker storage path in System | omv-extras |Docker | Docker storage.
That makes sense! I don't remember why I did it that way in the first place (probably followed some guide), but now is a good time to change this.
Alright, in that case I would go for a fresh install, I think. I'm positive about the backups, just tried importing them into other instances of the respective apps and it worked well.
How would I go about doing a fresh install? This is how I'd imagine it to go:
Would this work or am I reintroducing problems that I had before?
Regarding the config of running containers: What do you mean by that?
- docker-compose.yml + .env files
- the volumes where the containers store their data?
I have backed up the compose files, but also the docker apps as recommended in the respective docs (be it database dumps or config jsons). Not that I know whether that would be helpful, but I had also been backing up the /docker path - I haven't backed up volumes as described here: https://docs.docker.com/storag…e-or-migrate-data-volumes
What didn't fit into previous code block
/srv/dev-disk-by-label-wdred1/docker/volumes:
total 152K
drwxrwxrwx+ 15 root users 4.0K May 17 23:44 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwsrwx+ 3 root users 4.0K Jun 6 2020 0702a46d423ea846d0c20d9e0e711535f57af60afd3aefe8c74aa78ce386235d
drwxrwsrwx+ 3 root users 4.0K Jun 7 2020 133b8a8522fd9e79b4f00dcd3b37e6a6ff2897d2f1b7f8ff5d73dccb96273053
drwxrwsrwx+ 3 root users 4.0K Jun 6 2020 15b32b647d21b2bb4a79d386f257c51080ebafea2e1343f99e56ec77d02a4d19
drwxrwxrwx+ 3 root users 4.0K Jul 8 2021 1a7a5710210eaf85c7c66272ddef5ef3ba9e9a8149fbb2ebaa41765b3cb4ec5e
drwxrwxrwx+ 3 root users 4.0K Jul 8 2021 203b58d41c86d535a3a0f2e19a91f96fd308efa3a0672c8f3aee3f4125395f6e
drwxrwsrwx+ 3 root users 4.0K Jun 7 2020 4c9ed33dfce60281e08e507abc150b6f750fa58b2fe817c43cd6582fb601b178
drwxrwsrwx+ 3 root users 4.0K Jun 7 2020 7253d38fabdd569925764f73d2333fbe64dad85e2fa78494ab778dcff5e65dbc
drwxrwsrwx+ 3 root users 4.0K Jun 6 2020 b4e7d97f54924de6da14de5e0a92943ddc9bd989a9d258cfe476572911a70722
brwxrwxrwx+ 1 root users 8, 1 May 17 23:44 backingFsBlockDev
drwxrwsrwx+ 3 root users 4.0K Jun 7 2020 be8c48e5b4f67046017c7df2cdb2c31ca2832690b204c8d54d6d16701daceea3
drwxrwxrwx+ 3 root users 4.0K Jul 8 2021 c7d8a0bb82b1c0e6097776cf158afc5391d7e61aef26cb60b8f0625642bc5988
drwxrwsrwx+ 3 root users 4.0K Jun 7 2020 dca8f0ae7a996fd8b70b148f9cce5573d2c98bac1e7e4622288ded8fb1e0deb3
drwxrwsrwx+ 3 root users 4.0K Jun 7 2020 ddfe1b6b714fdce96dbb36db80dabd18e2fbd1d8b0de605e8edf4f4e063bba0c
-rwxrwxrwx+ 1 root users 64K May 17 23:44 metadata.db
drwxrwsrwx+ 3 root users 4.0K Jun 5 2020 portainer_data
Display More
/srv/dev-disk-by-label-wdred1/docker/bazarr:
total 32K
drwxrwxrwx+ 4 root users 4.0K Jul 8 2021 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 2 root users 4.0K Jul 8 2021 custom-cont-init.d
drwxrwxrwx+ 2 root users 4.0K Jul 8 2021 custom-services.d
/srv/dev-disk-by-label-wdred1/docker/bookstack:
total 76K
drwxrwxrwx+ 9 pi pi 4.0K Aug 4 2021 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
-rwxrwxrwx+ 1 pi pi 52 Aug 4 2021 BOOKSTACK_APP_KEY.txt
drwxrwxrwx+ 2 root root 4.0K Aug 4 2021 custom-cont-init.d
drwxrwxrwx+ 2 root root 4.0K Aug 4 2021 custom-services.d
drwxrwxrwx+ 2 pi pi 4.0K Aug 4 2021 keys
drwxrwxrwx+ 4 pi pi 4.0K May 22 04:00 log
drwxrwxrwx+ 3 pi pi 4.0K Aug 4 2021 nginx
drwxrwxrwx+ 2 pi pi 4.0K Aug 4 2021 php
drwxrwxrwx+ 5 pi pi 4.0K May 18 00:32 www
/srv/dev-disk-by-label-wdred1/docker/bookstackdb:
total 52K
drwxrwxrwx+ 6 pi pi 4.0K Aug 4 2021 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 2 root root 4.0K Aug 4 2021 custom-cont-init.d
drwxrwxrwx+ 2 root root 4.0K Aug 4 2021 custom-services.d
-rwxrwxrwx+ 1 pi pi 3.7K Aug 4 2021 custom.cnf
drwxrwxrwx+ 5 pi pi 4.0K May 18 00:32 databases
drwxrwxrwx+ 3 pi pi 4.0K Aug 4 2021 log
/srv/dev-disk-by-label-wdred1/docker/builder:
total 32K
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
-rwxrwxrwx+ 1 root users 16K Jun 5 2020 fscache.db
/srv/dev-disk-by-label-wdred1/docker/buildkit:
total 120K
drwxrwxrwx+ 4 root users 4.0K Dec 29 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
-rwxrwxrwx+ 1 root users 32K May 17 23:44 cache.db
-rwxrwxrwx+ 1 root users 16K Dec 29 2020 containerdmeta.db
drwxrwxrwx+ 3 root users 4.0K Jun 5 2020 content
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 executor
-rwxrwxrwx+ 1 root users 16K Jun 5 2020 metadata.db
-rwxrwxrwx+ 1 root users 16K Dec 29 2020 metadata_v2.db
-rwxrwxrwx+ 1 root users 16K Jun 5 2020 snapshots.db
/srv/dev-disk-by-label-wdred1/docker/containers:
total 56K
drwxrwxrwx+ 7 root users 4.0K May 17 23:45 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 4 root users 4.0K May 18 00:32 24faca7988b8f06266b2c8f7e46b08ee57fe0652ac594e22fe004de91f4840b5
drwxrwxrwx+ 4 root users 4.0K May 17 23:45 703a5369a31cca7e6bb263ecf725017908d20ab2aae3d91dc3ff9e1afc83f5f4
drwxrwxrwx+ 4 root users 4.0K May 18 00:32 94cde2374020dba81e7743b757ae157c8ca9937fe6a6359aa59b1b991c769720
drwxrwxrwx+ 4 root users 4.0K May 18 00:31 a86af04bccace643d7c90cdfe6d5d8b373fa9f4a8eaea60ed0ed17cdd69d9b44
drwxrwxrwx+ 4 root users 4.0K May 18 00:32 bc1c6d94c1a060552c4614dabd703718faaa8ce58ab253a56c9cae7999134bf7
/srv/dev-disk-by-label-wdred1/docker/docker:
total 112K
drwxrwsrwx+ 14 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 builder
drwxrwsrwx+ 4 root users 4.0K Jun 5 2020 buildkit
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 containers
drwxrwsrwx+ 3 root users 4.0K Jun 5 2020 image
drwxrwsrwx+ 3 root users 4.0K Jun 5 2020 network
drwxrwsrwx+ 3 root users 4.0K Jun 5 2020 overlay2
drwxrwsrwx+ 4 root users 4.0K Jun 5 2020 plugins
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 runtimes
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 swarm
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 tmp
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 trust
drwxrwsrwx+ 2 root users 4.0K Jun 5 2020 volumes
/srv/dev-disk-by-label-wdred1/docker/duplicati:
total 5.4G
drwxrwxrwx+ 8 duplicati users 4.0K May 22 07:30 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 3 duplicati users 4.0K Jul 14 2021 .cache
drwxrwxrwx+ 4 duplicati users 4.0K Jul 14 2021 .config
drwxrwxrwx+ 3 duplicati users 4.0K Jul 14 2021 .mono
-rwxrwxrwx+ 1 duplicati users 423M May 22 05:00 BRWTLAFXGB.sqlite
-rwxrwxrwx+ 1 duplicati users 440K May 22 07:30 Duplicati-server.sqlite
-rwxrwxrwx+ 1 duplicati users 2.6G May 22 03:30 NVTOXXTJLI.sqlite
-rwxrwxrwx+ 1 duplicati users 1.9G May 22 07:30 OJIAHSWHPR.sqlite
-rwxrwxrwx+ 1 duplicati users 68M May 22 03:00 RJWBSQTKNB.sqlite
-rwxrwxrwx+ 1 duplicati users 116M May 22 07:00 SJDIZKSKHQ.sqlite
-rwxrwxrwx+ 1 duplicati users 284M May 22 01:00 XHAVSSRPAD.sqlite
-rwxrwxrwx+ 1 duplicati users 99M May 22 02:30 XYRPUHBFDM.sqlite
drwxrwxrwx+ 2 duplicati users 4.0K Jul 14 2021 control_dir_v2
drwxrwxrwx+ 2 root root 4.0K Jul 14 2021 custom-cont-init.d
drwxrwxrwx+ 2 root root 4.0K Jul 14 2021 custom-services.d
/srv/dev-disk-by-label-wdred1/docker/heimdall:
total 72K
drwxrwxrwx+ 9 pi pi 4.0K May 18 00:11 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 2 root root 4.0K May 18 00:11 custom-cont-init.d
drwxrwxrwx+ 2 root root 4.0K May 18 00:11 custom-services.d
drwxrwxrwx+ 2 pi pi 4.0K May 18 00:11 keys
drwxrwxrwx+ 5 pi pi 4.0K May 22 02:00 log
drwxrwxrwx+ 3 pi pi 4.0K May 18 00:11 nginx
drwxrwxrwx+ 2 pi pi 4.0K May 18 00:11 php
drwxrwxrwx+ 6 pi pi 4.0K May 18 00:31 www
/srv/dev-disk-by-label-wdred1/docker/image:
total 24K
drwxrwxrwx+ 3 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 5 root users 4.0K May 17 23:45 overlay2
/srv/dev-disk-by-label-wdred1/docker/jellyfin:
total 100K
drwxrwxrwx+ 9 root users 4.0K Dec 28 01:37 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 6 root users 4.0K May 12 19:45 cache
drwxrwxrwx+ 2 root users 4.0K Jul 8 2021 custom-cont-init.d
drwxrwxrwx+ 2 root users 4.0K Jul 8 2021 custom-services.d
drwxrwxrwx+ 7 root users 4.0K Jun 8 2020 data
drwxrwxrwx+ 4 root users 4.0K Jun 6 2020 dlna
-rwxrwxrwx+ 1 root users 1.6K Apr 29 19:47 encoding.xml
-rwxrwxrwx+ 1 root users 591 Dec 28 01:38 livetv.xml
drwxrwxrwx+ 2 root users 4.0K May 17 02:00 log
-rwxrwxrwx+ 1 root users 1.4K Jun 6 2020 logging.default.json
-rwxrwxrwx+ 1 root users 1.9K Jul 8 2021 migrations.xml
-rwxrwxrwx+ 1 root users 1.4K Jul 8 2021 network.xml
-rwxrwxrwx+ 1 root users 7.3K Jul 8 2021 system.xml
drwxrwxrwx+ 5 root users 4.0K Jun 6 2020 users
/srv/dev-disk-by-label-wdred1/docker/network:
total 24K
drwxrwxrwx+ 3 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 files
/srv/dev-disk-by-label-wdred1/docker/overlay2:
total 1.7M
drwxrwxrwx+ 212 root users 24K May 17 23:45 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 4 root users 4.0K Jul 14 2021 00e232d8b886eda35ab9e9499b8e1a90d5fea801419ff8ed020977e2b440b737
drwxrwxrwx+ 4 root users 4.0K Jun 7 2020 013cdbee8e30cfd47b95e227529e274e402730e9a98f0de0e25f7668aa6601b8
drwxrwxrwx+ 3 root users 4.0K Jun 5 2020 02d37269463041477099c50a674b47f439c7ecca047ef87ad54c3a1f93683796
drwxrwxrwx+ 4 root users 4.0K Jul 8 2021 0308a723ad1561cdd39196879d27042737257b7e8c68fe0d69a4b7d0cbb347e7
drwxrwxrwx+ 4 root users 4.0K May 17 22:46 065161b2455be9f9691aa32593b084002c2ea0df328fc7b39d7194fa6515b16e
[truncated -- all permissions for subdirectories are the same]
/srv/dev-disk-by-label-wdred1/docker/plugins:
total 32K
drwxrwxrwx+ 4 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 4 root users 4.0K Dec 29 2020 storage
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 tmp
/srv/dev-disk-by-label-wdred1/docker/pyload:
total 212K
drwxrwxrwx+ 8 root users 4.0K Jul 19 2021 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
drwxrwxrwx+ 2 root users 4.0K Jul 19 2021 Logs
-rwxrwxrwx+ 1 root users 1.6K Jul 19 2021 accounts.conf
drwxrwxrwx+ 2 root users 4.0K Jul 19 2021 custom-cont-init.d
drwxrwxrwx+ 2 root users 4.0K Jul 19 2021 custom-services.d
-rwxrwxrwx+ 1 root users 28K Jul 19 2021 files.db
-rwxrwxrwx+ 1 root users 1 Jul 19 2021 files.version
-rwxrwxrwx+ 1 root users 97K Jul 19 2021 plugin.conf
-rwxrwxrwx+ 1 root users 2.8K Jul 19 2021 pyload.conf
-rwxrwxrwx+ 1 root users 3 Jul 19 2021 pyload.pid
drwxrwxrwx+ 23 root users 4.0K Jul 19 2021 scripts
drwxrwxrwx+ 5 root users 4.0K Jul 19 2021 tmp
drwxrwxrwx+ 9 root users 4.0K Jul 19 2021 userplugins
/srv/dev-disk-by-label-wdred1/docker/runtimes:
total 16K
drwxrwxrwx+ 2 root users 4.0K May 17 23:44 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
/srv/dev-disk-by-label-wdred1/docker/swarm:
total 16K
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
/srv/dev-disk-by-label-wdred1/docker/tmp:
total 16K
drwxrwxrwx+ 2 root users 4.0K May 17 23:45 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
/srv/dev-disk-by-label-wdred1/docker/trust:
total 16K
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 .
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 ..
Display More
Thanks for following up! Here is the output of the commands:
(only bookstack+db, duplicati and heimdall had been running
total 196K
drwxrwxrwx+ 22 root users 4.0K May 18 00:11 .
drwxr-xr-x 8 root root 4.0K May 18 00:11 ..
drwxrwxrwx+ 4 root users 4.0K Jul 8 2021 bazarr
drwxrwxrwx+ 9 pi pi 4.0K Aug 4 2021 bookstack
drwxrwxrwx+ 6 pi pi 4.0K Aug 4 2021 bookstackdb
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 builder
drwxrwxrwx+ 4 root users 4.0K Dec 29 2020 buildkit
drwxrwxrwx+ 7 root users 4.0K May 17 23:45 containers
drwxrwsrwx+ 14 root users 4.0K Jun 5 2020 docker
drwxrwxrwx+ 8 duplicati users 4.0K May 22 07:30 duplicati
drwxrwxrwx+ 9 pi pi 4.0K May 18 00:11 heimdall
drwxrwxrwx+ 3 root users 4.0K Jun 5 2020 image
drwxrwxrwx+ 9 root users 4.0K Dec 28 01:37 jellyfin
drwxrwxrwx+ 3 root users 4.0K Jun 5 2020 network
drwxrwxrwx+ 212 root users 24K May 17 23:45 overlay2
drwxrwxrwx+ 4 root users 4.0K Jun 5 2020 plugins
drwxrwxrwx+ 8 root users 4.0K Jul 19 2021 pyload
drwxrwxrwx+ 2 root users 4.0K May 17 23:44 runtimes
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 swarm
drwxrwxrwx+ 2 root users 4.0K May 17 23:45 tmp
drwxrwxrwx+ 2 root users 4.0K Jun 5 2020 trust
drwxrwxrwx+ 15 root users 4.0K May 17 23:44 volumes
Display More
Oh no, hope it's fixable!
docker root is in /var/lib/docker which is a symbolic link to a location on an external drive (/srv/dev-disk-by-label-wdred1/docker)
I've been able to back up the configs of the running containers. Would it work to delete the current directory, then re-install docker, pointing it to the original (now empty) path?
tl;dr: After setting permissions (wrongly), stacks can't be created or removed in Portainer (log: docker-compose: permission denied)
Hi all,
Recently, after adding a new drive to a MergerFS union, I noticed that Jellyfin (running in Docker) was not able to see media stored on the newly added drive. Before that, I had updated the volumes in docker-compose (through Portainer stack) to point to the desired location in the MergerFS-union, so I figured that this was a permissions issue. To solve this, I messed with the ACL and permissions in the OMV GUI, but this didn't help.
Today, while trying to update my Docker containers, Portainer started throwing the following error: failed to remove a stack: unknown shorthand flag: 'f' in -f (similar to: https://github.com/portainer/p…ues/6069#issue-1052081903) as well as failed to fetch metadata: fork/exec /data/docker_config/cli-plugins/docker-compose: permission denied.
Additionally, Duplicati (run in Docker) now throws the following error when starting a backup job: Access to the path "/tmp/dup-190b2edd-5d3e-4568-b970-ddd91144b744" is denied.
To mitigate this, I tried to remove and re-install both Docker and Portainer through the OMV GUI (this was also the only way I installed them before), but it hasn't changed anything as well.
Because of the "permission denied"-errors, I suspect that I messed up Docker-path-related permissions. I found the following issues, but don't know how to apply them to my specific situation:
I'd be happy about any suggestions to fix this issue. Thanks!
failed to remove a stack: unknown shorthand flag: 'f' in -ffailed to remove a stack: unknown shorthand flag: 'f' in -