COMPREHENSIVE CHANGES: INFRASTRUCTURE MIGRATION: - Migrated services to Docker Swarm on OMV800 (192.168.50.229) - Deployed PostgreSQL database for Vaultwarden migration - Updated all stack configurations for Docker Swarm compatibility - Added comprehensive monitoring stack (Prometheus, Grafana, Blackbox) - Implemented proper secret management for all services VAULTWARDEN POSTGRESQL MIGRATION: - Attempted migration from SQLite to PostgreSQL for NFS compatibility - Created PostgreSQL stack with proper user/password configuration - Built custom Vaultwarden image with PostgreSQL support - Troubleshot persistent SQLite fallback issue despite PostgreSQL config - Identified known issue where Vaultwarden silently falls back to SQLite - Added ENABLE_DB_WAL=false to prevent filesystem compatibility issues - Current status: Old Vaultwarden on lenovo410 still working, new one has config issues PAPERLESS SERVICES: - Successfully deployed Paperless-NGX and Paperless-AI on OMV800 - Both services running on ports 8000 and 3000 respectively - Caddy configuration updated for external access - Services accessible via paperless.pressmess.duckdns.org and paperless-ai.pressmess.duckdns.org CADDY CONFIGURATION: - Updated Caddyfile on Surface (192.168.50.254) for new service locations - Fixed Vaultwarden reverse proxy to point to new Docker Swarm service - Removed old notification hub reference that was causing conflicts - All services properly configured for external access via DuckDNS BACKUP AND DISCOVERY: - Created comprehensive backup system for all hosts - Generated detailed discovery reports for infrastructure analysis - Implemented automated backup validation scripts - Created migration progress tracking and verification reports MONITORING STACK: - Deployed Prometheus, Grafana, and Blackbox monitoring - Created infrastructure and system overview dashboards - Added proper service discovery and alerting configuration - Implemented performance monitoring for all critical services DOCUMENTATION: - Reorganized documentation into logical structure - Created comprehensive migration playbook and troubleshooting guides - Added hardware specifications and optimization recommendations - Documented all configuration changes and service dependencies CURRENT STATUS: - Paperless services: ✅ Working and accessible externally - Vaultwarden: ❌ PostgreSQL configuration issues, old instance still working - Monitoring: ✅ Deployed and operational - Caddy: ✅ Updated and working for external access - PostgreSQL: ✅ Database running, connection issues with Vaultwarden NEXT STEPS: - Continue troubleshooting Vaultwarden PostgreSQL configuration - Consider alternative approaches for Vaultwarden migration - Validate all external service access - Complete final migration validation TECHNICAL NOTES: - Used Docker Swarm for orchestration on OMV800 - Implemented proper secret management for sensitive data - Added comprehensive logging and monitoring - Created automated backup and validation scripts
26 lines
1.1 KiB
Plaintext
26 lines
1.1 KiB
Plaintext
DRIVER VOLUME NAME
|
|
local 0c31f3704137a3c4b0d2acc8070b5c2a432e785536274638736245d94f19ac1f
|
|
local 2cb6254e43f1a79bb9434eb6d35194328dbbb1b9c1cdc259fe0cbb829166cea3
|
|
local 51b29b24122015eeb7902f2b59ee6ffa36986d9055d582d88a45a7b8d571e8d1
|
|
local 203e339e501e528c426ed6bc8757d9da8449d7e1f344c92759945a3eedb349cc
|
|
local 675098f711eec0e5dc7fde8a9246ac34b07ae8783e1b2d4c076acebb37cc03c0
|
|
local be2fdd310d999c397b05a9c24247d14f09dc5aa18a45c6eaf6515590907d40d2
|
|
local c9fdee8b81debd68a68755c390c8d9941539953f73fcf7f308d59d6ab494f4fa
|
|
local coding_immich-model-cache
|
|
local coding_immich-pgdata
|
|
local docker_grafana_data
|
|
local docker_mongodb_data
|
|
local docker_postgres_data
|
|
local docker_prometheus_data
|
|
local docker_redis_data
|
|
local f28d9e11738602e7371c14b6894cd2f3cb7a84376eeb1ab587d94b2405048da7
|
|
local raggraph_neo4j_data
|
|
local raggraph_neo4j_logs
|
|
local raggraph_neo4j_plugins
|
|
local traefik-test_traefik_test_logs
|
|
local traefik_nginx_config
|
|
local traefik_nginx_logs
|
|
local traefik_traefik_dynamic
|
|
local traefik_traefik_letsencrypt
|
|
local traefik_traefik_logs
|