Differences

This shows you the differences between two versions of the page.

Link to this comparison view

home_server:media_vm_setup [2021-05-22 Sat wk20 16:05] – [Some other handy pointers and commands related to the iptables setup:] baumkphome_server:media_vm_setup [2023-04-30 Sun wk17 17:43] (current) – external edit 127.0.0.1
Line 115: Line 115:
   *To start the vpn service: ''sudo systemctl start openvpn@privatvpn.service'', was ''openvpn@btguard.service''   *To start the vpn service: ''sudo systemctl start openvpn@privatvpn.service'', was ''openvpn@btguard.service''
   *To check the end of the journal file for the vpn specific comments from the last boot: ''journalctl -u openvpn@privatvpn.service -b 0 -xe''   *To check the end of the journal file for the vpn specific comments from the last boot: ''journalctl -u openvpn@privatvpn.service -b 0 -xe''
-  *To check current external IP address: ''%%wget http://ipinfo.io/ip -qO -%%''+  *__To check current external IP address: ''%%wget http://ipinfo.io/ip -qO -%%''__
   *To list current tables in nftables: ''sudo nft list table ip firewall'', not inet, specifically ip, as ip6 is disabled.   *To list current tables in nftables: ''sudo nft list table ip firewall'', not inet, specifically ip, as ip6 is disabled.
   *To start nftables: ''sudo systemctl start nftables''   *To start nftables: ''sudo systemctl start nftables''
Line 139: Line 139:
  
 To install nftables: "sudo apt update" followed by ''sudo apt install nftables'' To install nftables: "sudo apt update" followed by ''sudo apt install nftables''
 +++++Old, to;dr;|
 If the nftables repository can not be found in Ubuntu 18.04 they will need to be added: ''sudo vim /etc/apt/sources.list'' and add the following repositories: If the nftables repository can not be found in Ubuntu 18.04 they will need to be added: ''sudo vim /etc/apt/sources.list'' and add the following repositories:
 <file> <file>
Line 146: Line 146:
   deb http://security.ubuntu.com/ubuntu bionic-security universe   deb http://security.ubuntu.com/ubuntu bionic-security universe
 </file> </file>
 +++++
 ====Sample NFTables configuration script for PrivatVPN==== ====Sample NFTables configuration script for PrivatVPN====
 ''sudo vim /etc/nftables.conf'' ''sudo vim /etc/nftables.conf''
 ++++nftables.conf script| ++++nftables.conf script|
-<file>+<code>
 #!/usr/sbin/nft -f #!/usr/sbin/nft -f
  
Line 227: Line 228:
    }    }
 } }
-</file>+</code> 
 The use of the counter directive allows the usage to be checked. I commented out lines that were not being used. The use of the counter directive allows the usage to be checked. I commented out lines that were not being used.
 ++++ ++++
 +  *To see active tables in load nftables ''sudo nft list tables''
 +  *To see table commands: ''sudo nft list table ip firewall'' and ''sudo nft list table ip6 firewall''
   *Select the server from [[https://privatevpn.com/serverlist|PrivateVPN Server List]].     *Select the server from [[https://privatevpn.com/serverlist|PrivateVPN Server List]].  
   *The host IP address can be found using the following commands:  ''host au-mel.pvdata.host'' or '' ping au-mel.pvdata.host''.   *The host IP address can be found using the following commands:  ''host au-mel.pvdata.host'' or '' ping au-mel.pvdata.host''.
Line 417: Line 421:
 ++++ ++++
 ====Some other handy pointers and commands related to the iptables setup:==== ====Some other handy pointers and commands related to the iptables setup:====
-++++ ^|+++++Old, TL;DR; | 
   *Remember if creating the script from scratch to make executable use: ''sudo chmod a+x BTGuard_iptable.sh''   *Remember if creating the script from scratch to make executable use: ''sudo chmod a+x BTGuard_iptable.sh''
   *Use the ''route'', ''ifconfig'', ''ip a'' and ''ip route'' commands to help check configuration of your network. (As noted below, particularly check the eth0 / tun0 references match.)   *Use the ''route'', ''ifconfig'', ''ip a'' and ''ip route'' commands to help check configuration of your network. (As noted below, particularly check the eth0 / tun0 references match.)
Line 425: Line 430:
   *The outgoing packet IP addresses, including subnet masks, must match those specified by BTGuard.   *The outgoing packet IP addresses, including subnet masks, must match those specified by BTGuard.
   *To get the external IP address use: ''%%wget http://ipinfo.io/ip -qO -%%''   *To get the external IP address use: ''%%wget http://ipinfo.io/ip -qO -%%''
-  *To see the current openvpn status use: ''sudo systemctl status openvpn@btguard.service'' or ''journalctl -u openvpn@btguard.service -b'' ++++ +  *To see the current openvpn status use: ''sudo systemctl status openvpn@btguard.service'' or ''journalctl -u openvpn@btguard.service -b'' 
 +++++
 ====How to make IPTables configuration permanent / restore on boot==== ====How to make IPTables configuration permanent / restore on boot====
 +++++ old tl;dr; |
 Reference [[http://askubuntu.com/questions/119393/how-to-save-rules-of-the-iptables|How to save rules of the iptables?]] and [[http://manpages.ubuntu.com/manpages/wily/man8/netfilter-persistent.8.html|Ubuntu Netfilter manual]] Reference [[http://askubuntu.com/questions/119393/how-to-save-rules-of-the-iptables|How to save rules of the iptables?]] and [[http://manpages.ubuntu.com/manpages/wily/man8/netfilter-persistent.8.html|Ubuntu Netfilter manual]]
   *Install iptables persistent ''sudo apt install iptables-persistent''   *Install iptables persistent ''sudo apt install iptables-persistent''
   *To save current IPTable configuration use: ''sudo netfilter-persistent save'' or ''journalctl -u openvpn@btguard.service -f'', where options are; ''-u'' is followed by the service and the ''-f'' give continuous output, use ''cont-c'' to breakout.   *To save current IPTable configuration use: ''sudo netfilter-persistent save'' or ''journalctl -u openvpn@btguard.service -f'', where options are; ''-u'' is followed by the service and the ''-f'' give continuous output, use ''cont-c'' to breakout.
 +++++
 ======Kodi Setup======= ======Kodi Setup=======
  
Line 439: Line 445:
  
 Kodi can be loaded on to many different types of hardware and operating systems, it even has a Linux based OS design for it, [[http://openelec.tv/|OpenELEC]]. Specifically it does run on MS Windows and most flavours of Linux. Kodi can be loaded on to many different types of hardware and operating systems, it even has a Linux based OS design for it, [[http://openelec.tv/|OpenELEC]]. Specifically it does run on MS Windows and most flavours of Linux.
-=====Kodi Server MariaDB (MySQL) Setup===== 
  
 +=====Kodi Server MariaDB (MySQL) Setup=====
 +++++ old tl;dr; |
 I have been using MariaDB instead of MySQL, as MariaDB is true opensource software and MySQL belongs to a large corporation. MariaDB has a few "quirks" to setup comparied to MySQL which is more commonly described. I have been using MariaDB instead of MySQL, as MariaDB is true opensource software and MySQL belongs to a large corporation. MariaDB has a few "quirks" to setup comparied to MySQL which is more commonly described.
  
Line 481: Line 488:
   *''show grants for 'kodi';''   *''show grants for 'kodi';''
   *''\q''   *''\q''
 +++++
  
 ---- ----
 ====Kodi Headless Server Setup==== ====Kodi Headless Server Setup====
  
-++++ Old to be deleted |+++++ Old tl;dr; |
  
 **Work in Progress. I have not been able to get this working yet.** I get the webui operational with the default kodi-headless settings. When I adjust the advanced kodi setting the webui is not available. I am also concern that this setup will not update the media library as there is no drive link in the design. **Work in Progress. I have not been able to get this working yet.** I get the webui operational with the default kodi-headless settings. When I adjust the advanced kodi setting the webui is not available. I am also concern that this setup will not update the media library as there is no drive link in the design.