This may have been caused by unavailable DNS. If I access the PVE web UI by IP, rather than hostname, I am able to get much quicker VNC console access to the pfsense guest and so see the splash screen and get to the guest's boot menu.
I expected the desktop OS or web browser to have cached DNS...
I find, when trying to reach the console of a vm when booting it, vnc is slow to connect. Meaning I miss the Proxmox splash screen/bios and the opportunity to interact with a guest's boot menu. e.g. pfSense and trying to interrupt boot to get single user mode.
Is there something I can do to...
If the CT's OS is recent debian, use journalctl command. Same with the PVE host.
What I would do is tail the journal journalctl -f on the PVE host, then start the CT.
Perhaps do the same in the CT guest, tail the journal prior to starting docker and any containers.
journalctl will, if terminal...
As @leesteken says, you may be confusing nested kvm with the nesting feature of CTs. The latter I believe allows the CT access to the host's procfs and sysfs. Something I think you need in order to run docker in an unprivileged CT. I have a couple of CTs successfully running docker and PVE is up...
It is also covered in the postfix docs Enabling SASL authentication in the Postfix SMTP/LMTP client
Check your domain's spf record includes your hosting company's spf.
I've experienced lack of (or rather lower than expected) disk IO stats for any CT that was runnng docker. Be it newly created on PVE8 or carried over from a previous install. I thought perhaps pvestat was seeing the read/write activity for the CT root mount but not in docker overlay fs.
I missed that detail. Thanks for pointing it out. I have read the postfix announcement several times over the past month or two. I guess it still didn't sink in!
Are any changes proposed for pmg-api postfix templates following the changes introduced by postfix (3.7.10-0+deb12u1)?
* 3.7.10
- Security (outbound SMTP smuggling): with the default setting
"cleanup_replace_stray_cr_lf = yes" Postfix will replace
stray <CR> or <LF> characters...
That will only show the number of matches. To print the matched lines themselves, add --print-all-matched.
Once set up, you use fail2ban-client (rather than fail2ban-regex) to administer a running fail2ban instance (e.g. manually add/remove blocked IPs).
You can see from your fail2ban-client...
Your output shows your regex test on a logfile and then presumably part of your local jail.local config.
All being well, fail2ban will log everything including Bans/Unbans to /var/log/fail2ban.log. I believe you can/could configure logging to go to systemd journal. Check 'logtarget'.
To see...
I believe some /etc/ files, that are potentially overwritten by pmg, have something like 'auto-generated' somewhere near the top. I don't know of a definitive list.
PMG doesn't overwrite spamassassin's custom.cf. Nor does it touch any supplemental files you might have created by way of...
I was not sure if it was related to the recent locking down of postfix (in PMG and third party servers).
The mail was accepted by PMG presumably because the same restriction aren't applied to the local smtpd port. Or at least not in my config!
I suspect it is caused by the way the mailclient...
The email concerned was an html quoted reply to an html email, to which I attached 2 PDFs. I tried several times to get it accepted. I am guessing it was something in the quoted html message or the way the mail client quoted that meesage? PMG accepted the message on each occassion, but the...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.