Resource icon

FN11.3 iocage jails - Plex, Tautulli, Sonarr, Radarr, Lidarr, Jackett, Transmission, Organizr

Great easy guide .. I just skipped the media folders part and used the mount points via the web gui. I was using the plex plugin for a long time and my OCD got the better part of me when I couldn't update the jail to 12.2 and was stuck on 12.1.

I had one little issue where plex wouldn't start after adding mount points, but running:

iocage exec 3DPlexPass service plexmediaserver_plexpass start

again seem to correct the issue and plex starts on it's own again after stopping the jail.

This easy setup combined with:

wget https://raw.githubusercontent.com/mstinaff/PMS_Updater/master/PMS_Updater.sh

sh PMS_Updater.sh -v -a

..now allows me to stay up to date with the whole ball of wax!
Awesome guide Pentaflake!
These tutorials have really helped me out with installing everything. My server is up and running doing everything I want it to do thanks to you Pentaflake
Easy guides for a beginner to follow. Saved me many hours. I only wish I found this page sooner
great resource for newer users. It could use a little more clarification in a couple of areas specifically the rcfile in ombi and the initial jail setup. I was not 100% on how the jail was initiated and initiated the process, thankfully, correctly. Overall wonderful tool here. Thanks for taking the time to put this together.
Awsome, I realy apreciate this resource
Very useful, thank you so much.
Super awesome guide for a begineer like me to follow! Many thanks for sharing :)
awesome post - thanks for taking the time to produce this - as a relative newcomer found this really useful - thanks!
Excellent work. Much appreciated.
Thanks for the guide!
great guide!! thanks for this.
really good guide for those who use iocage or can work out from these commands how to do this in a jail.
Thanks for this. You should maybe consider putting these on Github instead of maintaining a post here.
The best resource for making IOCAGE jails work with popular packages.
Thank you for this proper guide for all of the popular jails. Also for keeping it updated
ipfw rules do not work, see output here:

root@freenas:~ # iocage exec transmission service ipfw start
Flushed all rules.
00100 allow ip from any to any via lo0
00200 deny ip from any to 127.0.0.0/8
00300 deny ip from 127.0.0.0/8 to any
00400 deny ip from any to ::1
00500 deny ip from ::1 to any
00600 allow ipv6-icmp from :: to ff02::/16
00700 allow ipv6-icmp from fe80::/10 to fe80::/10
00800 allow ipv6-icmp from fe80::/10 to ff02::/16
00900 allow ipv6-icmp from any to any ip6 icmp6types 1
01000 allow ipv6-icmp from any to any ip6 icmp6types 2,135,136
03000 allow ip from 192.168.1.100 to 192.168.1.0/24 keep-state :default
03000 allow ip from 192.168.1.0/24 to 192.168.1.0 keep-state :default
04000 allow ip from 192.168.1.100 to 104.254.90.194 keep-state :default
05000 allow ip from any to any via tun*
65534 deny ip from any to any
Firewall rules loaded.
no nonsense to the point
Great guide and thanks for keeping it up to date!
Very comprehensive and helpful. A few issues with transmission settings and ipfw rules though.

Transmission: If you don't set transmission_chown="NO", then transmission resets the mounted dataset ownership to root:wheel on start of service, which you don't want.

IPFW: When the openvpn is up, can't access transmission web from LAN. Transmission web is only accessible when openvpn is down. No solution updated for this yet so far.
I've been using this ipfw script which seems to work as a killswitch for openvpn.

#!/bin/bash
# Flush out the list before we begin
ipfw -q -f flush

# Set rules command prefix
cmd="ipfw -q add"
vpn="tun0"

# allow all local traffic on the loopback interface
$cmd 00001 allow all from any to any via lo0

# allow any connection to/from VPN interface
$cmd 00010 allow all from any to any via $vpn

# allow connection to/from LAN by Transmission
$cmd 00101 allow all from me to 10.11.102.0/24 uid transmission
$cmd 00102 allow all from 10.11.102.0/24 to me uid transmission

# deny any Transmission connection outside LAN that does not use VPN
$cmd 00103 deny all from any to any uid transmission
Top