Skip to content

Commit

Permalink
Add 6.12.4 release notes (#90)
Browse files Browse the repository at this point in the history
Before Submitting This PR, Please Ensure You Have Completed The
Following:

1. [x] Are internal links to wiki documents using [relative file
links](https://docusaurus.io/docs/markdown-features/links)?
2. [x] Are all new documentation files lowercase, with dash separated
names (ex. unraid-os.mdx)?
3. [x] Are all assets (images, etc), located in an assets/ subfolder
next to the .md/mdx files?
4. [x] Have you checked to ensure there aren't other open [Pull
Requests](../../../pulls) for the same update/change?
5. [x] Is the build succeeding?
  • Loading branch information
ljm42 authored Aug 31, 2023
2 parents 456c9e2 + a95affd commit f027cac
Show file tree
Hide file tree
Showing 5 changed files with 208 additions and 5 deletions.
19 changes: 15 additions & 4 deletions docs/unraid-os/release-notes/6.12.0.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,9 +57,20 @@ Setting this option may result in higher power use but it may resolve this issue

#### Call traces related to macvlan

If "Docker custom network type" is set to "macvlan" you may get call traces and crashes on 6.12 even if you did not on 6.11. If so, we recommend
changing to "ipvlan", or if you have two network cards you can avoid the issue completely: refer
to [this Community forum post](https://forums.unraid.net/topic/137048-guide-how-to-solve-macvlan-and-ipvlan-issues-with-containers-on-a-custom-network/).
If you are getting call traces related to macvlan, as a first step we'd recommend navigating to Settings/Docker, switching to advanced view, and changing the "Docker custom network type" from macvlan to ipvlan. This is the default configuration that Unraid has shipped with since version 6.11.5 and should work for most systems.

However, some users have reported issues with port forwarding from certain routers (Fritzbox) and reduced functionality with advanced network management tools (Ubiquity) when in ipvlan mode.

In 6.12.0, the [two-nic docker segmentation method](https://forums.unraid.net/topic/137048-guide-how-to-solve-macvlan-and-ipvlan-issues-with-containers-on-a-custom-network/) is a viable workaround, but our recommendation is to upgrade to Unraid [6.12.4](6.12.4.md) which has a better solution.

#### Plex

If Docker containers have issues starting after a while, and you are running Plex, go to your Plex Docker container settings,
switch to advanced view, and add this to the Extra Params: `--no-healthcheck`

### Rolling back

See the comments under [Upgrade Notes](#upgrade-notes)

## ZFS pools

Expand Down Expand Up @@ -103,7 +114,7 @@ of slots corresponding to the number of devices in the pool to be imported. Next
the new pool. Upon array Start the pool should be recognized, though certain zpool topologies may not be
recognized (please report). Please note that only pools using partition #1 can be imported in this release, e.g. this `lsblk` output:

```
```bash
# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
sdb 8:16 0 7.3T 0 disk
Expand Down
10 changes: 10 additions & 0 deletions docs/unraid-os/release-notes/6.12.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Changes vs. [6.12.0](6.12.0.md)

## Upgrade notes

### Known issues

Please see the [6.12.0 release notes](6.12.0.md#known-issues) for general known issues.

### Rolling back

If rolling back earlier than 6.12.0, also see the [6.12.0 release notes](6.12.0.md#rolling-back).

## Bug fixes

- emhttpd: remove "unraid" from reserved names list
Expand Down
12 changes: 12 additions & 0 deletions docs/unraid-os/release-notes/6.12.2.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,18 @@

Changes vs. [6.12.1](6.12.1.md)

## Upgrade notes

### Known issues

Please see the [6.12.0 release notes](6.12.0.md#known-issues) for general known issues.

### Rolling back

If rolling back earlier than 6.12.0, also see the [6.12.0 release notes](6.12.0.md#rolling-back).

## Highlights

This is mainly a bug fix release, including also a minor security update. Other highlights:

- We reverted **docker** from v23.0.6, introduced during Unraid OS 6.12 development, to v20.10.24, which is the latest patch
Expand Down
12 changes: 11 additions & 1 deletion docs/unraid-os/release-notes/6.12.3.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,16 @@

Changes vs. [6.12.2](6.12.2.md)

## Upgrade notes

### Known issues

Please see the [6.12.0 release notes](6.12.0.md#known-issues) for general known issues.

### Rolling back

If rolling back earlier than 6.12.0, also see the [6.12.0 release notes](6.12.0.md#rolling-back).

## Networking

This release has fixes for networking, particularly as it relates to IPv6. A side effect is that this should resolve
Expand All @@ -15,7 +25,7 @@ Note: If you have code in your 'go' script to disable IPv6, remove that and disa
This release resolves an issue where Docker does not properly stop when the array Stops, which can result in an unclean shutdown.

If Docker containers have issues starting after a while, and you are running Plex, go to your Plex Docker container settings,
switch to advanced view, and add this to the Extra Params: --no-healthcheck
switch to advanced view, and add this to the Extra Params: `--no-healthcheck`

## Bug fixes and improvements

Expand Down
160 changes: 160 additions & 0 deletions docs/unraid-os/release-notes/6.12.4.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,160 @@
# Version 6.12.4 2023-08-31

## Upgrade notes

### Known issues

Please see the [6.12.0 release notes](6.12.0.md#known-issues) for general known issues.

### Rolling back

Before rolling back to an earlier version, it is important to ensure Bridging is enabled:

* ***Settings > Network Settings > eth0 > Enable Bridging*** = Yes

Then Start the array (along with the Docker and VM services) to update your Docker containers, VMs, and
WireGuard tunnels back to their previous settings which should work in older releases.

Once in the older version, confirm these settings are correct for your setup:

* ***Settings > Docker > Host access to custom networks***
* ***Settings > Docker > Docker custom network type***

If rolling back earlier than 6.12.0, also see the [6.12.0 release notes](6.12.0.md#rolling-back).

## Fix for macvlan call traces

The big news in this release is that we have resolved issues related to macvlan call traces and crashes!

The root of the problem is that macvlan used for custom Docker networks is unreliable when the parent interface is a
bridge (like br0), it works best on a physical interface (like eth0). We believe this to be a longstanding kernel
issue and have posted a [bug report](https://bugzilla.kernel.org/show_bug.cgi?id=217777).

If you are getting call traces related to macvlan, as a first step we recommend navigating to ***Settings > Docker***,
switch to advanced view, and change the "Docker custom network type" from macvlan to ipvlan. This is the default
configuration that Unraid has shipped with since version 6.11.5 and should work for most systems.

However, some users have reported issues with port forwarding from certain routers (Fritzbox) and reduced functionality
with advanced network management tools (Ubiquity) when in ipvlan mode.

For those users, we have a new method that reworks networking to avoid this. Tweak a few settings and your
Docker containers, VMs, and WireGuard tunnels should automatically adjust to use them:

* ***Settings > Network Settings > eth0 > Enable Bridging*** = No
* ***Settings > Docker > Host access to custom networks*** = Enabled

Note: if you previously used the [2-nic docker segmentation method](https://forums.unraid.net/topic/137048-guide-how-to-solve-macvlan-and-ipvlan-issues-with-containers-on-a-custom-network/),
you will also want to revert that:

* ***Settings > Docker > custom network on interface eth0*** (i.e. make sure eth0 is configured for the custom network, not eth1)

When you Start the array, the host, VMs, and Docker containers will all be able to communicate, and there should be no more call traces!

### Troubleshooting

* If your Docker containers with custom IPs are not starting, edit them and change the "Network type" to "Custom: eth0". We attempted
to do this automatically, but depending on how things were customized you may need to do it manually.
* If your VMs are having network issues, edit them and set the Network Source to "vhost0". Also, ensure there is a MAC address assigned.
* If your WireGuard tunnels will not start, make a dummy change to each tunnel and save.
* If you are having issues port forwarding to Docker containers (particularly with a Fritzbox router) delete and recreate the port
forward in your router.

### To get a little more technical...

After upgrading to this release, if bridging remains enabled on eth0 then everything works as it used to. You can attempt to work
around the call traces by disabling the custom Docker network, or using ipvlan instead of macvlan, or using the 2-nic Docker
segmentation method with containers on eth1.

Starting with this release, when you disable bridging on eth0 we create a new macvtap network for Docker containers and VMs to use.
It has a parent of eth0 instead of br0, which is how we avoid the call traces.

A side benefit is that macvtap networks are reported to be faster than bridged networks, so you may see speed improvements when
communicating with Docker containers and VMs.

FYI: With bridging disabled for the main interface (eth0), then the Docker custom network type will be set to macvlan and hidden
unless there are other interfaces on your system that have bridging enabled, in which case the legacy ipvlan option is available.
To use the new fix being discussed here you will want to keep that set to macvlan.

## System Drivers page

Navigate to ***Tools > System Drivers*** for visibility into the drivers available/in use on your system. 3rd party drivers installed
by plugins (such as NVIDIA and Realtek) have an icon that links to the support page for that driver. You can also
now add/modify/delete the modeprobe.d config file for any driver without having to find that file on your flash drive.

## Other bug fixes and improvements

* This release resolves corner cases in networking, Libvirt, Docker, WireGuard, NTP, NGINX, NFS and RPC. And includes an improvement
to the VM Manager so it retains the VNC password during an update.

* The shutdown process was modified to allow the NUT plugin to properly shut the system down.

* The notification display time before auto-closing is now configugurable (see ***Settings > Notification Settings***).

* A small change is that packages in /boot/extra are now treated more like packages installed by plugins, and the installation is
logged to syslog rather than to the console.

* The Update OS process will automatically update the Plugin-Update-Helper script if necessary.

## Changes vs. [6.12.3](6.12.3.md)

### Base distro

* create_network_ini:
* fixed dhcp hook
* improved IP address collection
* diagnostics:
* Add previous Unraid version to diagnostics version txt file.
* Add ntp.conf, sshd.config, and servers.conf (with anonymized URLs)
* anonymize IP addresses
* docker:
* add routing when shim or macvtap network is used
* fix routing when "host access" is enabled
* remove IPv6 from shim/vhost interface (some routers are incompatible)
* libvirt, nginx, nfs, rpc: changed running process detection
* nfsclient: start negotiation with v4, turn off atime modification
* rc.6: leave /usr and /lib mounted during shutdown
* rc.docker:
* create same IPv6 network for containers and services
* add more logging when stopping dockerd
* rc.inet1:
* do not use promiscuous mode for bridging
* add persistent option to dhcpcd
* rc.library: interfaces always listed in the same order, fix show ipv6
* rc.libvirt: remove 'itco' watchdog from XML if present
* rc.local: annotate auto-generated /etc/modprobe.d/zfs.conf file
* rc.services:
* add logging
* exclude WireGuard "VPN tunneled access for docker" tunnels from services
* exclude WireGuard tunnels for ntp (code optimization)

#### Package updates

* btrfs-progs: 6.3.3
* curl: version 8.2.0 (CVE-2023-32001)
* firefox: version 117.0.r20230824132758 (AppImage)
* kernel-firmware: version 20230724_59fbffa
* krb5: version 1.19.2 (CVE-2023-36054)
* openssh: version 9.3p2 (CVE-2023-38408)
* openssl: version 1.1.1v (CVE-2023-3817 CVE-2023-3446)
* samba: version 4.17.10 (CVE-2023-3496 CVE-2022-2127 CVE-2023-34968 CVE-2023-3496 CVE-2023-3347)

### Linux kernel

* version 6.1.49 (CVE-2023-20593)
* CONFIG_SCSI_MPI3MR: Broadcom MPI3 Storage Controller Device Driver

### webGUI

* Dashboard: hide ZFS bar when no ZFS is used
* Docker settings: fix subnet sizes
* Feedback: refactor feedback script
* Network settings: fix DNS settings sometimes disappear
* Notifications: new notification option: auto-closure time, default is 5 seconds
* Pools: minimum free space: only enabled when array is stopped
* Shares and Pools: show "Minimum free space" as absolute number instead of percentage
* System Drivers: new page
* Translations: trim key and value in language files
* VM Manager: Retain VNC password during update.
* VM Manager: Remove downloaded '.vv' files.
* CSS: set overflow-x to 'auto'
* update monitor_nchan

0 comments on commit f027cac

Please sign in to comment.