That's built-in. Perhaps the better request would be to make it easier and more intuitive, where a system has multiple NICs, to specify how they should work together.I would like to see a virtual interface that can be composed of a 1Gb and then a 10Gb interfaces. When the 10Gb interface is up use it , if its down use the 1Gb.
I would urge you to take a good look at the pfSense GUI as a live install/VM (and especially its dashboard, system graph reports, and general UI controls layout). In WebUI terms, it does a lot of what I think *NAS is (or should be) striving for with NewUI, and what the comment above is expressing concern about. The WebUI isn't completely minimalist - like NewUI it uses a modern JS backend that adapts to different screen layouts - but at the same time it's clearly aimed at functionality as well.Different datasets have different snapshot and replication requirements. Some snaphots only exist a week others for three months; some get snapshots every 15 minutes, some once a day. Some snapshots we want replicated immediately others wait until after normal business hours.
(This question really goes to one of my strongest FreeNAS concerns... is the FreeNAS future a consumer product or an enterprise product? The pre-11 GUI was clearly enterprise in nature. No frills and lean. It was designed for functionality and allowed those with multiple datasets, volumes, interfaces, etc. to see those things easily and from one screen. The post-11 interface is flashy and consumer-oriented, will look good on the side of a box and in product reviews but doesn't have the information density or clarity necessary for those of us with installations beyond a single volume, single dataset, single interface, single replication task. I fear the utility of FreeNAS at the SMB level is being hurt by implementing the consumer grade GUI. Yes, I know the core is mostly the same. But management is done through the GUI and the new GUI is horrible for larger installations.)
Cheers,
Matt
That's built-in. Perhaps the better request would be to make it easier and more intuitive, where a system has multiple NICs, to specify how they should work together.
Maybe an easy way would be like this (see mockup):
- Allow the user to create named "interface groups" - pretty much a field to enter a group name, and a description of how the group works (failover/parallel, and an ordered list of priority for the NICs in it). The user can see which NICs are in the group, and can order them to set priority (for failover) or specify they work in parallel.
- Within the config for each interface, add a field to specify whether the interface is independent, or part of some NIC group.
- Done.
Sometimes an idea hits and goes "wow!". This was such an idea. I suspect it might have a very positive impact and ripple out to the wider benefit of iX/*NAS.Easyish method for submitting FreeNAS hardware config and server statistics to searchable database. Non-identifiable, of course. Voluntary (but possibly the default), of course.
(snip)
See http://doc.freenas.org/11/network.html - specifically, the subsection on Link Aggregations. This covers four kinds of aggregation, including the two best-known kinds, namely: "I want to use 2 or more connections in parallel to increase bandwidth" and "I want my main connection to fallback to a secondary connection if it fails". The second of those is what you're asking about.How is this built in... as far as I can tell everyone said its not possible due to networking within BSD?
See http://doc.freenas.org/11/network.html - specifically, the subsection on Link Aggregations. This covers four kinds of aggregation, including the two best-known kinds, namely: "I want to use 2 or more connections in parallel to increase bandwidth" and "I want my main connection to fallback to a secondary connection if it fails". The second of those is what you're asking about.
What's not possible is assigning multiple IPs to multiple interfaces on the same subnet, which is how you're imagining it being done. But LACP/LAGG doesn't need to do that.
That's a clever idea. My NAS is idle at night, it wouldn't be a huge burden provided I could limit electricity use - I imagine it's CPU intensive not HDD intensive which would be fine (18 HDDs but just one CPU!)FreeNAS Sponsoring via Crypto Mining? configurable off course, like: If CPU usage < 20% allow minig up to 70% CPU usage
Can I request automated minor update handling ("apply minor updates on detection/X hours after detection"?). I think major updates might be best left manual, but minor don't often break things and may have important security/bug implications.Please let me set a timestamp when that update shall be installed and the reboot be made so this can be scheduled for non-office hours.
I don't think that tools to allow the *NAS box to manage its own security and login are off-track. It sounds like there's some conflation between general firewall capabilities (eg for other traffic routing through), and basic securing/locking down of the NAS itself (eg detecting brute force attempts). I do agree that more sophisticated defences should be implemented on whatever router/firewall the NAS is behind (it is behind one, somehow, right?) but that's not the same as disallowing anything onboard. For example imagine a household that has a shared LAN (some users live with parents/friends/relatives) - one might want to restrict access to a login to specific IPs/hosts/interfaces even on a LAN, or prevent a shared service in a shared house being used as a starting-point for mischief. Some degree of access control isn't unreasonable, to a point below that which would suggest getting a separate router/firewall and sticking the NAS behind it even on a LAN.Edit: I'm trying to avoid commenting on the suggestions here, other than to offer currently-existing alternatives to a few of them, as I'm seeing the purpose of this thread as brainstorming. But I do think the firewalling suggestions are pretty far afield.
As far as I know (I could be wrong?) you can disable it in two ways: 1) don't enter anything in the "periodic task" field for the share - you can still have the task but this is where it gets the data "should I expose File History" from, AFAIK). 2) you can manually override almost any Samba settings in the auxilliary parameters, so if your aux params for that share contain a custom (textual) vfs objects parameter that excludes shadow_copy and shadows_copy2, or contains vfs params for shadow_copy thast prevent exposure, then it will override the inbuilt default. Perhaps it should be easier but yes it's doable.I'd like to be able to NOT expose snapshots via windows previous versions when snapshotting and sharing but currently if I snapshot I am forced to expose this to the end user.
That's only a limitation AFAIK for LACP configuration (multiple connections for increased throughput), which is reasonable since frames/packets couldn't arrive in comparable order if the links differed much in speed, which can cause severe issues in packet buffering. But I couldn't find anything saying it also applies to failover configuration. For example, if your wired 1G LAN fails over to a slow Wifi link, you wouldn't expect it to downrate universally and run at 54 mbps even on wired, when it's not actually using the wifi link at all. You'd expect 1gbps on wired, dropping to 54 if it fails over to wifi. (I should test this - I could do with the 1G Intel NIC as a failover for the 10G Chelsios :D)The issue is two different speeds in the LAGG.
FreeNAS needs a Distributed filesystem like GlusterFS or Ceph (too soon for pNFS?): The simple traditional master/backup design became too old and limited.
Integrate Let's Encrypt as an option in SSL cert generation, to be able to create certificates for services like S3 (Minio).
Improve replication transfer speed. When I created a new replication server it took around 4 days for it to finish because it wouldn't transfer faster than ~120Mb/s, on a dual 10Gb/s link.
Since it's not properly out in the wild yet, it's a bit early to say if people are going to submit plugins for the new infrastructure.
I hear that redmine thing is popular these days...
Embrace the cloud. One can get a cheap Synology or QNAP box and effortlessly manage it from anywhere, access files from anywhere and sync folders from anywhere. I know this would incur in infrastructure costs for iXsystems, but I would happily pay for this.
Idea 3: Be able to enable and disable all snapshot replication in one hit (since I don't keep my backup box on all the time and I think this would be easy to implement), or multi-select which datasets you wish to enable / disable quickly
Just to check... do you remember if you were using the default encryption algorithm (secure, but slow-ish)? If you were, and you're operating on a known-secure network then choosing one of the faster-to-process (but less secure) encryption algorithms can make a big difference.