Yep! it’s easy,
If you’re on on 6.8.0-RC1 or any subsequent releases, the above step 4 won’t work, to get around that, do the following (my preferred method & also works on previous releases)
iotop -oa
bwm-ng -T avg -R 1 -i disk -c 1 -I sda,sdb,sdc,sdd,sde,sdf,sdg -H
# Add "-o html" for html output
lsof /dev/md*
mkdir /mnt/other_documents
mount -t cifs -o user=username,password=password,iocharset=utf8 //192.168.0.2/documents /mnt/other_documents
vers=1.0
to -o
if connecting to an older unraid.iocharset=utf8
is how file and directory names are handled.rsync -avPX /mnt/user/documents/ /mnt/other_documents/
Do not forget ending slashes on directories to transfer the contents of source into the destination.
Leaving off trailing slashes causes the source folder itself to sync into the destination path.
a - equals rlptgoD below:
r - recursive recurse into directories
l - links copy symlinks as symlinks
p - perms preserve permissions
t - times preserve modification times
g - group preserve group
o - owner preserve owner (super-user only)
D - same as --devices --specials
--devices preserve device files (super-user only)
--specials preserve special files
v - verbose increase verbosity
P - same as --partial --progress
--progress show progress during transfer
--partial keep partially transferred files
X - xattrs preserve extended attributes
W - whole-files copy files whole (w/o delta-xfer algorithm)
S - sparse handle sparse files efficiently
(VM hdd's and such)
I use a User Script entry with the schedule set to “At First Array Start Only” as you do not want to run this more than once per boot.
WIREGUARD_INTERFACE=wg1
WIREGUARD_LAN=10.253.2.0/24
MASQUERADE_INTERFACE=eth0
iptables -t nat -I POSTROUTING -o $MASQUERADE_INTERFACE -j MASQUERADE -s $WIREGUARD_LAN
iptables -N WIREGUARD_INPUT
iptables -N WIREGUARD_DROP_WG0_INPUT
iptables -A INPUT -j WIREGUARD_INPUT
iptables -A WIREGUARD_INPUT -i $WIREGUARD_INTERFACE -j WIREGUARD_DROP_WG0_INPUT
iptables -A WIREGUARD_DROP_WG0_INPUT -s 10.253.2.0/24 -j DROP
iptables -A WIREGUARD_DROP_WG0_INPUT -j RETURN
# Add a WIREGUARD_wg0 chain to the FORWARD chain
CHAIN_NAME="WIREGUARD_$WIREGUARD_INTERFACE"
iptables -N $CHAIN_NAME
iptables -I FORWARD -i $WIREGUARD_INTERFACE -j $CHAIN_NAME
# Accept related or established traffic
iptables -A $CHAIN_NAME -o $WIREGUARD_INTERFACE -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
# These are the docker IP's and ports I want to grant these tunnel wg1 peers access to.
iptables -A $CHAIN_NAME -i $WIREGUARD_INTERFACE -d 172.17.0.10 -p tcp -m tcp --dport 9117 -j ACCEPT
iptables -A $CHAIN_NAME -i $WIREGUARD_INTERFACE -d 172.17.0.20 -p tcp -m tcp --dport 1433 -j ACCEPT
iptables -A $CHAIN_NAME -i $WIREGUARD_INTERFACE -d 172.17.0.4 -p tcp -m tcp --dport 5432 -j ACCEPT
# Drop everything else coming through the Wireguard interface
iptables -A $CHAIN_NAME -i $WIREGUARD_INTERFACE -j DROP
# Return to FORWARD chain
iptables -A $CHAIN_NAME -j RETURN
Create and paste the following into
/usr/local/emhttp/plugins/iarp.docker/event/stopping_docker
#!/bin/bash
logger "test from stopping_docker in iarp.test"
sed '1!G;h;$!d' "/boot/config/plugins/dockerMan/userprefs.cfg" | while read line || [[ -n $line ]];
do
# do something with $line here
tmp=${line#*\"} # Remove everything up to and including first =
container_name=${tmp::-1}
echo "Stopping $container_name"
docker stop $container_name
done
inotifywait -e create,modify,attrib,moved_from,moved_to --timefmt %c --format '%T %_e %w %f' -mr /var/lib/docker
inotifywait -mr -e close_write --format '%w%f' /mnt/disk1 /mnt/disk2
inotifywait -rme access,modify,close_write,open --timefmt '%F %T' --format '%T %w%f %e' /boot/config/plugins/dockerMan/
inotifywait -e access,create,modify,attrib,moved_from,moved_to --timefmt %c --format '%T %_e %w %f' -mr /boot
inotifywait -e create,modify,attrib,moved_from,moved_to -mr /mnt/cache/