De1taE1even

Members
  • Posts

    201
  • Joined

  • Last visited

Converted

  • Gender
    Undisclosed

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

De1taE1even's Achievements

Explorer

Explorer (4/14)

3

Reputation

  1. I found this post because I had a similar issue. I saw that the Lime version of PMS had an update available, so I applied it, and when the docker container restarted, I couldn't get to the Plex UI and I saw the same "user not found" errors in the docker log. My solution was to use the video referenced above to use the official plex container instead. Followed the directions in the video and now my server is up and running again, no issues.
  2. Thanks! I'll check that out. My whole house is wired, so bandwidth isn't an issue. Sent from my SAMSUNG-SM-N920A using Tapatalk
  3. Ah, gotcha. Didn't think about that. I was more worried about it from a system stability standpoint, but I didn't even think about having trouble booting from that card. Thanks for the info!
  4. Sorry, maybe you misunderstood my question. Since I only have one USB bus, I was thinking about installing a legacy pci USB card to run unRAID off of, so that I can pass through my one USB bus to the VM. The legacy pci bus wouldn't get passed through. I was just wondering if I'd be asking for trouble by running unRAID off of a legacy pci-usb card.
  5. Forwarding the onboard audio device to the VM shouldn't be an issue. My mobo has 2 sound devices, the one on the mobo itself, and the one supplied by the cpu. I also have an audio device from my GTX1070 (the one you said you didn't want to use). All 3 are available to forward to the VM. I never tried the intel one from my cpu, but I've gone back and forth between the Intel 9 series device and the GTX1070 audio controller, and both worked. Yep, as long as you have a second USB controller that your unRAID USB isn't using, you should be able to forward that bus to the VM. The newer versions of unRAID have made that even easier as well. If you look at the above screenshot, you'll see that my USB bus is selectable to forward to the VM. Nothing wrong with using a PCIe SATA controller, but I'd make sure it's a chip that has been known to be compatible. Check the lime-tech wiki for compatible devices. I have personally never passed through an entire SATA bus to a VM, but I know others have. If the PCIe slot and your SATA controller share the same bus (they sometimes do), you might have trouble getting this going, but I don't have much experience here, so someone else could chime in for a definitive answer. Yep, you should have no trouble here. I've had no issues with my 1070.
  6. Hey all, I was trying to get a USB bus forwarded to a Windows VM on my backup server, but I'm having issues. My AsRock mobo only has 1 useable usb bus, so I can't forward it to my VM, since my unRAID flash has to utilize usb. I tried everything, including overriding ACS. My mobo's BIOS settings didn't help either. From the research I've done, it's actually not AsRock's fault. The H97 chipset is to blame evidently. If you want to utilize both usb 2.0 and 3.0 ports, the chipset automatically uses EHCI for all ports. There is evidently no way to force the mobo to use XHCI for 2.0 and EHCI for 3.0. That scenario simply isn't supported by the chipset. So, I don't know of a way around it. I searched around the forum a bit, and popular suggestion was to add a pcie usb card and forward that to the VM. Great! I even have one of those cards laying around! Well, I thought it was great until I realized I don't have an open pcie slot in my mobo! The only open slot I have in the mobo is an old-school PCI slot, which brings me to the question in the subject line. Is there any problem buying a PCI USB 2.0 card, and running the unRAID flash drive off of it, so that I can forward the EHCI bus to the VM? Thanks.
  7. That's a good way to describe the two scenarios/methods. Right now I have no desire to do things like watch video, stream audio, transfer large files, etc, so the TeamViewer option is appealing, and I'll play with that a bit. I'm still going to get the VPN set up and play with it as well, just because, well, I can. I'll be using pfSense as soon as the NIC I bought comes in, and it'll be fun to play with and learn about. Again thanks to everyone for all the info. My picture is much clearer now.
  8. Yeah I was realizing that as I was googling just now, but thanks for the clarification. I think I'm going to play around with both OpenVPN, and with a free PC remote access program (even if it's a Go To PC free trial), and decide between the 2. The one thing I don't want to do, for all the reasons I already knew, along with the ones provided by you guys, is having to expose ports at the router level, and trust my applications to handle security.
  9. This is where I just want to bang my head against a wall. I never even thought to use a service like Go To PC, Citrix, etc to connect to my Win10 VM, vs direct access to the network. The most pathetic thing is we use services like these at work every friggin day, so yeah, I feel a bit dumb right now. Seems like these services might not be quite as secure, but maybe that isn't a deal-breaker as long as I have a reasonable amount of confidence that my home network won't get compromised.
  10. Great point, I probably should have been more clear. I want access to all the web ui content, from the unRAID webfront, to sickbeard, sab, deluge, etc. I don't necessarily need "direct", or "command line" access to unRAID, but correct me if I'm wrong, if I have access to my Windows VM, what would keep me from opening up a putty session from there and logging into my unRAID machine? Seems like giving myself access to my Windows VM would be giving me access (in one form or another) to EVERYTHING.
  11. Also within the reddit post I linked to, there was mention of using the Microsoft RDP protocol. I have a W10 Pro VM running 24/7 at home, so if there's a way to use RDP for remote access, that is secure, that could be an option as well. Of course, that would also require client software as well, so I don't know what I'm really buying myself at that point. Just another thing to research I guess.
  12. Fair enough, thanks. If VPN is the obvious, easiest, borderline only right choice, then I'm all for it. I'm not opposed to VPN, it's just that there's an appeal to being able to use any internet-connected device, and route to https://www.mydomain.com/myProperlyRoutedService without having to deal with a VPN client first. Just wishful thinking. I also ran across this reddit thread that has a lot of useful information intertwined with the bickering between a couple posters: https://www.reddit.com/r/usenet/comments/2fevzc/nzb_360_users_how_have_you_configured_your_setup/#bottom-comments I guess it's just my pathetically simple-minded attitude that keeps getting in my way. At a high level, it just seems like you could have something between your router and the outside world (or be built into the router), that would provide robust authentication before allowing access to anything within your internal network, without having to rely on client software. Internet-connected device -> hit external ip or ddns url -> authenticate with home network firewall/authentication service with user and/or certificate authentication -> access to the goodies. I wouldn't think the goodies would need to be individually secured, because we've already determined authentication. Again, this thought process MUST be naive because if it were that easy, everyone would be doing it!
  13. I have another related question and maybe it justifies its own thread, but I'll ask here first since we're on the subject. At work we use certificate authentication for most of our access, with some systems only requiring basic auth (username/password), and others requiring both. Is there a way to set up my home network to be exposed to the outer world (scary, I know), but be protected behind both certificate and basic authentication (two-factor authentication)? Seems like there could be an easier, yet still secure, way to gain access to my home network, other than VPN. Admittedly, there isn't much info on this thought, so I'm guessing many people much smarter than I would have done this already, if it were "remotely possible" (haha nerd puns). Thoughts? Thanks again.
  14. Great! When I was talking about having my own domain, this is what I was thinking.