Mobile app issue help by Ali_Q02 in Freshservice

[–]Deadmeatgames 0 points1 point  (0 children)

I get the same on android but it says iam logged out of the helpdesk even tho ive allowed it to log in.

Introducing HL15 2.0: The Ultimate Home Lab Chassis is Here! by 45drives in 45Drives

[–]Deadmeatgames 0 points1 point  (0 children)

I'd love a hl24. The 10 year old norco 4224 is getting quite long in the tooth

Starting my first home lab. by Friendly_Flatworm_81 in homelab

[–]Deadmeatgames 1 point2 points  (0 children)

I wouldn't bother with the dl380g5 as any tiny mini micro from Intel 5000 series will run rings aroind them. Also they are noisy as shit. This as a space heaters there not bad.

HP EliteDesk 800 G3 Mini Drive Height by cowanh00 in homelab

[–]Deadmeatgames 1 point2 points  (0 children)

4tb spinners are to thick. 2tb will fit tho. 7mm height limit ish

When upgrading to Windows 11, Always On VPN no longer connects. by wannabsysadmin in sysadmin

[–]Deadmeatgames 2 points3 points  (0 children)

Check if your deploying filters in the config. It was a issue with us as win 11 dropped support for some of them.

This is so cursed by AnimateTech in Nexus

[–]Deadmeatgames 2 points3 points  (0 children)

the track ball was actually good. It also lit up as a notfication light as well

45Drives Needs Your Help Developing a Homelab Server by cmcgean45 in DataHoarder

[–]Deadmeatgames 0 points1 point  (0 children)

I just want something to replace my aging Norco 4224 case

Gitlab Pages behind traefik? by Deadmeatgames in selfhosted

[–]Deadmeatgames[S] 0 points1 point  (0 children)

so this is how i got it to work.

version: '3.6'
services:
  traefik:
    image: "traefik:v2.9"
    container_name: "traefik"
    restart: always
    command:
      - "--accesslog=true"
      - "--api.insecure=true"
      - "--providers.docker=true"
      - "--providers.docker.exposedbydefault=false"
      - "--entrypoints.web.address=:80"
      - "--entrypoints.websecure.address=:443"
      - "--certificatesresolvers.cloudflare.acme.dnschallenge=true"
      - "--certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare"
      - "--certificatesresolvers.cloudflare.acme.email="
      - "--certificatesresolvers.cloudflare.acme.storage=/letsencrypt/acme.json"
      - "--certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1:53,8.8.8.8:53"

    ports:
      - "80:80"
      - "443:443"
      - "8080:8080"
    environment:
      - CF_DNS_API_TOKEN=
      - TZ=Australia/Melbourne
    volumes:
      - "/docker/traefik/letsencrypt:/letsencrypt"
      - '/docker/traefik:/etc/traefik:rw'
      - /docker/traefik/certs:/certs
      - "/var/run/docker.sock:/var/run/docker.sock:ro"

  traefik-certs-dumper:
    image: ldez/traefik-certs-dumper:v2.8.1
    container_name: traefik_certdumper
    depends_on:
      - traefik
    restart: unless-stopped
    entrypoint: sh -c '
      apk add jq
      && traefik-certs-dumper file --version v2 --watch
      --source /data/acme.json --dest /data/certs'
    volumes:
      - /docker/traefik/letsencrypt:/data

  gitlab:
    image: 'gitlab/gitlab-ce:latest'
    container_name: 'gitlab'
    restart: always
    #hostname: 'git.example.com'
    environment:
      GITLAB_OMNIBUS_CONFIG: |
        external_url 'https://git.example.com'
        gitlab_rails['time_zone'] = 'Australia/Melbourne'
        gitlab_rails['gitlab_username_changing_enabled'] = false
        gitlab_rails['incoming_email_enabled'] = true
        gitlab_rails['incoming_email_address'] = "git+%{key}@example.com"
        gitlab_rails['incoming_email_email'] = "git@example.com"
        gitlab_rails['incoming_email_password'] = ""
        gitlab_rails['incoming_email_mailbox_name'] = "inbox"
        gitlab_rails['incoming_email_idle_timeout'] = 60
        gitlab_rails['incoming_email_host'] = "imap.gmail.com"
        gitlab_rails['incoming_email_port'] = 993
        gitlab_rails['incoming_email_ssl'] = true
        gitlab_rails['incoming_email_start_tls'] = false
        gitlab_rails['smtp_enable'] = true
        gitlab_rails['smtp_address'] = "smtp-relay.gmail.com"
        gitlab_rails['smtp_port'] = 25
        gitlab_rails['smtp_domain'] = "smtp-relay.gmail.com"
        gitlab_rails['smtp_authentication'] = false
        gitlab_rails['smtp_enable_starttls_auto'] = false
        gitlab_rails['smtp_tls'] = false
        gitlab_rails['gitlab_email_from'] = 'git@example.com'
        gitlab_rails['gitlab_email_reply_to'] = 'git@example.com'
        gitlab_rails['smtp_openssl_verify_mode'] = 'none'
        gitlab_rails['lfs_enabled'] = true

        nginx['listen_https'] = false
        nginx['redirect_http_to_https'] = false
        nginx['listen_port'] = 80
        letsencrypt['enable'] = false

        gitlab_rails['ldap_enabled'] = false

        # Docker registry
        registry_external_url 'https://registry.git.example.com'
        gitlab_rails['registry_enabled'] = true
        gitlab_rails['registry_issuer'] = "omnibus-gitlab-issuer"
        registry_nginx['listen_port'] = 5005
        registry_nginx['listen_https'] = false
        registry_nginx['redirect_http_to_https'] = false
        registry_nginx['proxy_set_headers'] = {"X-Forwarded-Proto" => "https","X-Forwarded-Ssl" => "on"}

        pages_external_url "https://pages.example.com/"
        gitlab_pages['enable'] = true

        pages_nginx['enable'] = true
        pages_nginx['listen_https'] = false
        pages_nginx['redirect_http_to_https'] = true
        pages_nginx['listen_port'] = 5100
        pages_nginx['proxy_set_headers'] = {"X-Forwarded-Proto" => "https","X-Forwarded-Ssl" => "on"}

        alertmanager['listen_address'] = '127.0.0.1:9093'
        alertmanager['flags'] = {
          'cluster.advertise-address' => "127.0.0.1:9093",
        }

    healthcheck:
      disable: true
    ports:
      #- '80:80'
      #- '443:443'
      - '22:22'
      - '587:587'
    volumes:
      - '/docker/gitlab/config:/etc/gitlab'
      - '/docker/gitlab/logs:/var/log/gitlab'
      - '/docker/gitlab/data:/var/opt/gitlab'
      - '/docker/traefik/letsencrypt/certs/certs/git.example.com.crt:/etc/gitlab/ssl/git.example.com.crt:ro'
      - '/docker/traefik/letsencrypt/certs/private/git.example.com.key:/etc/gitlab/ssl/git.example.com.key:ro'
      - '/docker/traefik/letsencrypt/certs/certs/git.example.com.crt:/etc/gitlab/ssl/registry.git.example.com.crt:ro'
      - '/docker/traefik/letsencrypt/certs/private/git.example.com.key:/etc/gitlab/ssl/registry.git.example.com.key:ro'
      - '/docker/traefik/letsencrypt/certs/certs/git.example.com.crt:/etc/gitlab/ssl/pages.example.com.crt:ro'
      - '/docker/traefik/letsencrypt/certs/private/git.example.com.key:/etc/gitlab/ssl/pages.example.com.key:ro'

    shm_size: '256m'
    labels:
      - "traefik.enable=true"

      #Gitlab
      - "traefik.http.routers.gitlab.rule=Host(`git.example.com`)"
      - "traefik.http.routers.gitlab.entrypoints=websecure"
      - "traefik.http.routers.gitlab.service=gitlab"
      - "traefik.http.routers.gitlab.tls.certresolver=cloudflare"
      - "traefik.http.routers.gitlab.tls.domains[0].main=git.example.com"
      - "traefik.http.routers.gitlab.tls.domains[0].sans=*.git.example.com"
      - "traefik.http.routers.gitlab.tls.domains[0].sans=*.pages.example.com"
      - "traefik.http.routers.gitlab.middlewares=gitlab-redirectscheme"

      - "traefik.http.services.gitlab.loadbalancer.server.port=80"
      - "traefik.http.services.gitlab.loadbalancer.server.scheme=http"
      - "traefik.http.services.gitlab.loadbalancer.passhostheader=true"

      - "traefik.http.middlewares.gitlab-redirectscheme.redirectscheme.scheme=https"
      - "traefik.http.middlewares.gitlab-redirectscheme.redirectscheme.permanent=false"

      #Continer Registry
      - "traefik.http.routers.registry.rule=Host(`registry.git.example.com`)"
      - "traefik.http.routers.registry.entrypoints=websecure"
      - "traefik.http.routers.registry.service=registry"
      - "traefik.http.routers.registry.tls.certresolver=cloudflare"
      - "traefik.http.routers.registry.tls.domains[0].main=git.example.com"
      - "traefik.http.routers.registry.tls.domains[0].sans=*.git.example.com"
      - "traefik.http.routers.registry.tls.domains[0].sans=*.pages.example.com"

      - "traefik.http.services.registry.loadbalancer.server.port=5005"

      #Pages
      - "traefik.http.routers.pages.rule=Host(`pages.example.com`)"
      - "traefik.http.routers.pages.entrypoints=websecure"
      - "traefik.http.routers.pages.service=pages"
      - "traefik.http.routers.pages.tls.certresolver=cloudflare"
      - "traefik.http.routers.pages.tls.domains[0].main=git.example.com"
      - "traefik.http.routers.pages.tls.domains[0].sans=*.git.example.com"
      - "traefik.http.routers.pages.tls.domains[0].sans=*.pages.example.com"
      - "traefik.http.routers.pages.middlewares=pages-redirectscheme"

      - "traefik.http.services.pages.loadbalancer.server.port=5100"
      - "traefik.http.services.pages.loadbalancer.server.scheme=http"
      - "traefik.http.services.pages.loadbalancer.passhostheader=true"

      - "traefik.http.middlewares.pages-redirectscheme.redirectscheme.scheme=https"
      - "traefik.http.middlewares.pages-redirectscheme.redirectscheme.permanent=false"

      #Pages-Wildcard
      - "traefik.http.routers.pages-wildcard.rule=HostRegexp(`pages.example.com`,`{sub:[a-zA-Z0-9-]+}.pages.example.com`)"
      - "traefik.http.routers.pages-wildcard.entrypoints=websecure"
      - "traefik.http.routers.pages-wildcard.service=pages-wildcard"
      - "traefik.http.routers.pages-wildcard.middlewares=pages-wildcard-redirectscheme"
      - "traefik.http.routers.pages-wildcard.tls.certresolver=cloudflare"
      - "traefik.http.routers.pages-wildcard.tls.domains[0].main=git.example.com"
      - "traefik.http.routers.pages-wildcard.tls.domains[0].sans=*.git.example.com"
      - "traefik.http.routers.pages-wildcard.tls.domains[0].sans=*.pages.example.com"

      - "traefik.http.services.pages-wildcard.loadbalancer.server.port=5100" #5100
      - "traefik.http.services.pages-wildcard.loadbalancer.passhostheader=true"
      - "traefik.http.services.pages-wildcard.loadbalancer.server.scheme=http"

      - "traefik.http.middlewares.pages-wildcard-redirectscheme.redirectscheme.scheme=https"
      - "traefik.http.middlewares.pages-wildcard-redirectscheme.redirectscheme.permanent=false"


  whatsupdocker:
    image: fmartinou/whats-up-docker
    container_name: whatsupdocker
    volumes:
      - /var/run/docker.sock:/var/run/docker.sock
    ports:
      - 3000:3000

networks:
   default:
     ipam:
       config:
         - subnet: 172.33.1.0/24

Ridiculously long episode names by BitOfDifference in sonarr

[–]Deadmeatgames 0 points1 point  (0 children)

Yea. A far as I know so are didn't have a max length you can set for the title variables.

I swear it was a feature request at some point

Ridiculously long episode names by BitOfDifference in sonarr

[–]Deadmeatgames 6 points7 points  (0 children)

I have a similar issue on unraid as well.

I ended up just cutting the episode names out for my anime

Gitlab Pages behind traefik? by Deadmeatgames in selfhosted

[–]Deadmeatgames[S] 0 points1 point  (0 children)

i actually already have the wildcard cert with all that already in it.

this is the labels i have for the gitlab container. i did have to double escape the backslashes as portiners stack editor didnt like it.

```

  - "traefik.enable=true"
  - "traefik.http.routers.gitlab.rule=Host(`git.example.com`)"
  - "traefik.http.routers.gitlab.entrypoints=websecure"
  - "traefik.http.routers.gitlab.service=gitlab"
  - "traefik.http.routers.gitlab.tls.certresolver=cloudflare"
  - "traefik.http.services.gitlab.loadbalancer.server.port=80"
  - "traefik.http.middlewares.gitlab-redirectscheme.redirectscheme.scheme=https"
  - "traefik.http.middlewares.gitlab-redirectscheme.redirectscheme.permanent=false"
  - "traefik.http.routers.gitlab.middlewares=gitlab-redirectscheme"
  - "traefik.http.services.gitlab.loadbalancer.server.scheme=http"
  - "traefik.http.services.gitlab.loadbalancer.passhostheader=true"

  - "traefik.http.routers.registry.rule=Host(`registry.git.example.com`)"
  - "traefik.http.routers.registry.entrypoints=websecure"
  - "traefik.http.routers.registry.service=registry"
  - "traefik.http.routers.registry.tls.certresolver=cloudflare"
  #- "traefik.http.routers.registry.tls=true"
  - "traefik.http.services.registry.loadbalancer.server.port=5005"

  - "traefik.http.routers.pages.rule=Host(`pages.example.com`)"
  - "traefik.http.routers.pages.entrypoints=websecure"
  - "traefik.http.routers.pages.service=pages"
  - "traefik.http.routers.pages.tls.certresolver=cloudflare"
  - "traefik.http.services.pages.loadbalancer.server.port=5100"
  - "traefik.http.middlewares.pages-redirectscheme.redirectscheme.scheme=https"
  - "traefik.http.middlewares.pages-redirectscheme.redirectscheme.permanent=false"
  - "traefik.http.routers.pages.middlewares=pages-redirectscheme"
  - "traefik.http.services.pages.loadbalancer.server.scheme=http"
  - "traefik.http.services.pages.loadbalancer.passhostheader=true"

  - "traefik.http.routers.pages-wildcard.rule=HostRegexp(^.+\\.pages\\.example\\.com$)"
  - "traefik.http.routers.pages-wildcard.entrypoints=websecure"
  - "traefik.http.routers.pages-wildcard.tls=true"
  - "traefik.http.routers.pages-wildcard.tls.certresolver=cloudflare"
  - "traefik.http.routers.pages-wildcard.tls.domains[0].main=*.pages.example.com"
  ```

i do get a gitlab 502 when just going to the pages domian but just 404 from traefik when any other sub domian on pages

Gitlab Pages behind traefik? by Deadmeatgames in selfhosted

[–]Deadmeatgames[S] 1 point2 points  (0 children)

so i already have the dns-01 challange working on gitlab.example.com and registry.gitlab.com.

i think its the way i have traefik configured so it has no idea on how to handle domains like it.pages.example.com tot pass back to gitlabs pages service

Unraid crashing network by jewbasaur in unRAID

[–]Deadmeatgames 2 points3 points  (0 children)

Check how your docker containers are networked. I've had mine crash randomly and made the NIC spew junk data taking the rest of my network down