Posts by donh
-
-
-
-
The way I work with drives is have them in proxmox and then make virtual hard drives for what is needed. They can be made larger easily as needed and you can use snapshots and other features of proxmox.
Your milage may very.
-
Letsencrypt provides a certificate to verify you are connecting too the correct server with no man in the middle. It wont keep anyone else out.
I have not used wireguard yet. But from reading about it, it looks like the way to go now for a few reasons. Performance being the main one. Also ease of setup. And newer than openvpn. Some routers support a vpn. So if yours does look at the one it supports and compare it to wireguard. Most will probably move to wireguard someday but for now you just need a port forward and a little knowledge and experience to make it work.
-
Depending on what type of authentication plex uses it could be attacked by hackers. I would use wireguard if I was doing that.
-
Hey guys apologies for the silly question, but can someone please advise me or point me in the right direction to what's the point of using letsecnrypt
Does it then make it safe to forward your ports to modem, and you can now remotely access your OMV server safely?
I see it also being a requirement for nextcloud.I'm assuming there's no need for it if you're using wireguard/openvpn to access your server remotely as your ports won't be forwarded for the world to see?
No! Letsencrypt gives you a signed certificate. To connect safely to your OMV from remote you should use a "virtual private network" (vpn). I would be looking at wireguard. Not sure if there is a plugin for that yet.
-
-
There are a few threads about LDAP on here. Also look for "Active Directory" (AD). Depending on what server you are trying to connect to. There is a new plugin being worked on.
RE: Updated Plugin Active Directory / LDAP - OMV 5.x
If you are trying to connect to windows AD look at this. It works for me.
Active Directory / LDAP Revisited
Good Luck
-
Was not able to connect to my server 2012 ad.
-
Thanks for working on this. I have wanted to do this for years just never had time to learn the programing needed.
Will setup a vm and test against a server 2012 ad. I found it is better to use sssd for windows server.
-
You can get a newer controller and adapter cables. The expensive triplite ones worked were some of the cheap ones didn't. You will still only get 3MB/s but the full size. At least that worked on my old dell 2950.
-
Does \\ipaddress work?
-
Search for nested vm. Vm inside another vm. It is asking for trouble. Maybe someone else can explain better. I will be in the back country till Tuesday. Hope you get it figured out before then
-
OMV runs well as a vm. You are nesting your vm's (containers) on the OMV.
Proxmox -- OMV -- VM
I would do.
Proxmox -- OMV
1 \- VM 1
2 \- VM 2
3 \- VM etc
-
Proxmox is purpose built to run virtual machines. Why would you not run vm's on it instead of OMV? Anyway try your problem on a new vm and see if it works.
-
I have posted a script here.
Active Directory / LDAP Revisited
It is probably that uids are out of range. Windows uses high numbers like 1334455. You can edit a file to allow them. Should be explained in the thread above. /etc/login.defs
This link is broken.
blog.cadena-it.com/linux-ceh/i…crosoft-active-directory/
...?
-
Run testparm at the cli or over ssh.
-
-
No No No No No. Have you seen such a button in a professional software? Not me. OMV already is testing the configuration during the deployment phase.
Seems there was no error when saving the config. Maybe there was but it was not obvious or mentioned by the op. I don't see what would have told him to try testparm. Maybe testparm could be run on save. Then display the errors? But that might confuse people too. There may be minor warnings that don't actually break things?
Thanks