the great migration from truenas to fedora and all its collatoral
All checks were successful
Reese's Arch Toolbox / build-and-push-arch-toolbox (push) Successful in 24m47s
All checks were successful
Reese's Arch Toolbox / build-and-push-arch-toolbox (push) Successful in 24m47s
This commit is contained in:
@@ -23,6 +23,8 @@
|
||||
- [Scale](#scale)
|
||||
- [ARC Limit](#arc-limit)
|
||||
- [Certs](#certs)
|
||||
- [Let's Encrypt](#lets-encrypt)
|
||||
- [Self-signed CA](#self-signed-ca)
|
||||
- [Testing](#testing)
|
||||
- [iperf](#iperf)
|
||||
- [disk](#disk)
|
||||
@@ -34,6 +36,8 @@
|
||||
- [UPS Monitoring](#ups-monitoring)
|
||||
- [ZFS Size Data](#zfs-size-data)
|
||||
- [ZFS Rename](#zfs-rename)
|
||||
- [ISCSI](#iscsi)
|
||||
- [Base Name](#base-name)
|
||||
|
||||
## Bios settings
|
||||
|
||||
@@ -307,8 +311,16 @@ setfacl -b -R /mnt/enc0/smb/media
|
||||
### Converting zvol to qcow2
|
||||
|
||||
```bash
|
||||
dd if=/dev/zvol/enc1/vms/unifi-e373f of=unifi.raw
|
||||
# Convert zvol to raw
|
||||
dd status=progress bs=1M if=/dev/zvol/enc0/vms/nextcloud-fi7tkq of=/mnt/enc0/vms/qcow2/nextcloud-fi7tkq.raw
|
||||
# Convert raw to qcow
|
||||
qemu-img convert -f raw -O qcow2 unifi.raw unifi.qcow2
|
||||
|
||||
# Convert in batch
|
||||
# Convert zvol to raw
|
||||
for FILE in $(ls /dev/zvol/enc0/vms); do dd status=progress bs=1M if=/dev/zvol/enc0/vms/$FILE of=/mnt/enc0/vms/qcow2/$FILE.raw; done
|
||||
# Convert raw to qcow
|
||||
for FILE in $(ls /dev/zvol/enc0/vms); do echo "qemu-img convert -f raw -O qcow2 /mnt/enc0/vms/qcow2/$FILE.raw /mnt/enc0/vms/qcow2/$FILE.qcow2"; done
|
||||
```
|
||||
|
||||
### Converting qcow2 to zvol
|
||||
@@ -354,6 +366,24 @@ Set `When` to `Post Init`.
|
||||
|
||||
## Certs
|
||||
|
||||
### Let's Encrypt
|
||||
|
||||
<https://www.truenas.com/docs/scale/22.12/scaletutorials/credentials/certificates/settingupletsencryptcertificates/>
|
||||
|
||||
Note, for all "Name" fields use your domain with all "." replaced with "-"
|
||||
|
||||
Examaple: `driveripper.reeselink.com` becomes `driveripper-reeselink-com`
|
||||
|
||||
1. Go to Credentials > Certificates and click ADD in the ACME DNS-Authenticators widget
|
||||
2. Generate credentials for your domain via [AWS IAM](/cloud/graduated/aws_iam/aws_iam.md)
|
||||
3. Click ADD in the Certificate Signing Requests widget
|
||||
1. Remember, only the SAN is required
|
||||
4. Click the wrench icon next to the new CSR
|
||||
1. In "Identifier" use `domain-something-com-le-stage` for staging and `domain-something-com-le-prod` for prod
|
||||
5. System -> General Settings -> GUI Settings -> GUI SSL Certificate -> `domain-something-com-le-prod`
|
||||
|
||||
### Self-signed CA
|
||||
|
||||
<https://raymondc.net/2018/02/28/using-freenas-as-your-ca.html>
|
||||
|
||||
1. Create a new Root certificate (CAs -> ADD -> Internal CA)
|
||||
@@ -534,4 +564,14 @@ Make sure you unshare any connected shares, otherwise you'll get
|
||||
|
||||
```bash
|
||||
zfs rename enc0/something enc0/something_else
|
||||
```
|
||||
```
|
||||
|
||||
## ISCSI
|
||||
|
||||
### Base Name
|
||||
|
||||
<https://datatracker.ietf.org/doc/html/rfc3721.html#section-1.1>
|
||||
|
||||
| iqn | . | year-month of domain registration | . | reversed domain | : | unique string
|
||||
|
||||
iqn.2022-01.com.reeselink:driveripper
|
||||
|
||||
Reference in New Issue
Block a user