I have a VPS on Digitalocean which I used mfsbsd to reinstall FreeBSD with ZFS/zroot with PF as my firewall. My plan with this VPS is to run wordpress, a static site and owncloud each in their own jails. Currently, I use nginx on the host machine running as a reverse proxy, intercepting https...
What's the best practise to handle the prots tree with iocage managed basejails?
Currently I am manually nullfs mounting the host systems /usr/ports everytime I need it in each jail, but as the number of jails are growing this feels more and more cumbersome.
I have been fighting with this for a couple days now with no luck; I would greatly appreciate any help.
I have my server listening on 10.21.96.200 and my jails, which are ran from within IOCage are listening on 192.168.0.1/24.
I am able to telnet to 192.168.0.2 445 (samba) just to insure...
I'm trying to determine why sysutils/iocage is so slow on my server when compared to a small VirtualBox VM on a laptop. Here are the specs of each.
Let me know if more information is required!
Model: Dell R610
CPU: Intel L5520
RAM: 32GB ECC RAM
HD: 2x 120GB SSD (striped ZFS)
I have a fresh install of FreeBSD 10.2, it’s installed on VirtualBox. I have given the VM 4x virtio-net bridged adaptors—so they appear to be on my home network (192.168.1.0/24).
My host rc.conf looks like this:
I am using iocage to manage my jails. When I created the jails, I assigned them an address on my LAN with a command similar to:
iocage create tag=myjail ip4_addr="re0|192.168.1.201"
However, after a few hours the network in the jail disconnects. I can't think of a good way to explain it, but I...
Up to now, I have always used iocage with the release of the host system. Today, I wanted to try to create a jail with the 9.3-RELEASE but I ended up with a 10.2-RELEASE on the jail. To be sure I did things properly, I did the following steps.
# iocage clean -r
WARNING: this will destroy all...
The main reason to put a browser in a jail is quite simple : browsers cannot be trusted. They are too much exposed. Executing a browser inside a jail is a way to be sure that the damages induced by a malicious software are contained (as much as possible). I decided to write this...
I'm new to IPv6 networking and trying to set up jails using sysutils/iocage-devel on FreeBSD 10.2R amd64 in Hetzner, who charge for every extra IPv4 but give you an IPv6/64 free with every root server.
I've got DNS lookups working over UDP from the jail to the host successfully drill -u -6...