In OMV6's GUI:
Under System > Plugins find and highlight openmediavault-compose 6.X, and click the Install button.
Warning | |
Do not uninstall the openmediavault-sharerootfs plugin. It is a dependency of the openmediavault-compose plugin. Uninstalling openmediavault-sharerootfs when the openmediavault-compose plugin is installed will cause the openmediavault-compose plugin to be uninstalled. |
This is the plugin's general settings tab. We can define the necessary parameters for the operation of the plugin, as well as install, uninstall or restart docker.
./
for example ./config
) in your compose files those folders will be created inside the subfolder corresponding to that compose file.:ro
(read only) in the composition file. By default, any volume larger than 1GB is excluded.# BACKUP
at the end of the line that defines a volume will include that volume in the backup.:ro
will never be included regardless.# SKIP_BACKUP
at the end of the line that defines a volume will exclude that volume in the backup./var/lib/docker
.
Notes | |
This folder will store docker's internal working files, images, containers, etc. You do not need to back up this folder, it does not store any information that should be persistent. The default path is ''/var/lib/docker'' on the OMV system disk. If OMV is installed on a USB flash drive it is recommended to choose a different location to avoid excessive writing to this drive. Choosing a different disk will help prevent the system disk from filling up, which would cause OMV to malfunction. |
Files is the yaml and env file management window, for configuring containers with docker-compose.
In this tab you can perform any action necessary to manage these files, including creating, modifying, deleting, starting or stopping containers, updating images, etc.
The files generated here will be stored in subfolders within the folder configured in Compose Files in the previous point.
The tab displays a list of existing files and a top bar with buttons to perform various actions.
Selecting a file activates the buttons on the top bar.
Allows you to act on the container or containers defined in a yaml file simultaneously. Actions executed in this tab will be applied to all containers defined in the yaml file.
Allows you to create the yaml and env configuration files of a container. Pressing the button will open a dialog box with the following fields:
Allows you to create example containers from preconfigured yaml files in the plugin. In this list you will find numerous examples of yaml files ready to be adapted to your system configuration and implemented next.
It allows you to download a file from a URL and create a configuration file from it.
Allows you to create yaml configuration files from containers running on the system that have not been created with compose. Use only when necessary, the generated file will be much larger than necessary to deploy a container. Useful if you have lost the configuration data of a container created in the CLI.
Note | |
In the Add from example button there is a file prepared to generate a Composerize container, which will generate yaml files from docker CLI container generation commands. |
Allows you to import existing compose files into the plugin.
Allows you to edit the yaml and env files of the selected file.
The window is the same as the Create button already seen.
Activates when selecting a file.
Allows you to delete a file.
The corresponding subfolder in compose folder along with the yaml and env configuration files will also be removed.
Activates when selecting a file.
Allows you to define global environment variables.
These variables will be available to be used in the compose file that we are interested in doing.
Example of variable in this file:
MYPUID=1000
Usage in a compose file:
- PUID=${MYPUID}
When that container is run docker will run this:
- PUID=1000
It will check the configuration of a file and report possible errors if they are detected.
Util before launching the defined container or containers.
Any error that appears in a red box can be copied to the clipboard from the notifications button in the top bar of OMV to read it in its entirety.
Activates when selecting a file.
Allows you to start the containers belonging to the selected yaml file.
If this is the first start, the container images will be downloaded, then the containers defined in the file will be put into operation.
Activates when selecting a file.
Allows you to stop the containers defined in the selected file. Useful if some monitoring needs to find the container and see the output message.
Activates when selecting a file.
Allows you to stop and remove the containers defined in the selected file.
Activates when selecting a file.
Allows you to download the latest images available on the internet from the containers defined in the selected file.
Previous images are still on the system. To remove old images you can use the prune button.
Activates when selecting a file.
Allows you to see in a pop-up window the status of the containers defined in the selected file.
Activated when selecting a file.
Allows you to clean the system of images, containers, volumes or networks that are no longer needed and recover space.
Link to this document.
This tab shows you the running services generated by docker containers.
Allows you to perform some actions on them.
The Ports column shows links that you can click to access the webui generated by each service.
It will download the latest image corresponding to the selected service.
It will restart the selected service using the last downloaded image.
It will restart the selected service.
It will display the logs of the selected service up to this point and stop.
It will display logs for the selected service and will continue to display new logs if any occur.
Shows a list of running containers displaying the usage status of the resources used.
Selecting a container activates the buttons on the top bar.
Docker inspect provides detailed information about builds controlled by Docker.
Activated when selecting a container.
Allows you to view the log of the selected container.
Activated when selecting a container.
It will display logs for the selected container and will continue to display new logs if any occur.
Activated when selecting a container.
Shows existing images on the system. Allows you to manage these images.
Deletes the selected image if it is not currently in use. If it is in use it will return an error and will not be removed.
Displays the result of inspecting the selected image.
Shows existing networks on the system. Allows you to manage these networks.
Opens a dialog that allows you to create a custom network interface.
Deletes the selected network interface.
Inspects the selected network interface and lists its properties.
Shows existing volumes on the system. Allows you to manage these volumes.
Deletes the selected volume.
Inspects the selected volume and lists its properties.
Shows a list of running containers displaying the basic execution data.
Selecting a container activates the buttons on the top bar.
It allows acting on the containers individually. Actions executed in this tab will be applied only to the selected container, regardless of whether the yaml file defines one or more containers.
The Ports column will display a link that provides access to the GUI of each container via its port and the domain the server uses, opening a new tab in the web browser. Your router has to allow DNS registration of the other domain names and the client with the browser has to be able to look up that fqdn in dns. How that is done depends on the router/DHCP/DNS system you are using.
Allows you to restart the selected container.
Activated when selecting a container.
Allows you to view the log of the selected container.
Activated when selecting a container.
Shows the continuous output of the container logs.
Activated when selecting a container.
This is the Dockefiles management tab for creating images.
Dockerfiles are managed in this tab to perform any action on them. here the Dockerfiles are created, modified, deleted, etc.
The generated Dockerfiles will be stored in the folder configured in settings, using subfolders generated by the plugin.
The tab shows a list of generated Dockerfiles and a top bar of buttons that allow executing the actions required in each case.
Selecting a Dockerfile activates the action buttons.
In this tab you can create a Dockerfile to generate your own container images.
Allows you to edit the Dockerfile, script and conf files of the selected Dockerfile.
The operation of this tab is similar to the Create button already seen.
Triggered by selecting a Dockerfile.
Allows you to delete a Dockerfile.
It will also remove the corresponding subfolder along with the Dockerfile configuration, script and conf files.
Triggered by selecting a Dockerfile.
Allows you to deploy Dockerfile with the defined configuration. The first image will be pulled from the internet if it is not available on the host. A modified image will be created from the instructions defined in the Dockerfile.
Triggered by selecting a Dockerfile.
It will do the same as the Build button but the initial image will always be downloaded from the internet in its most updated version even if it exists on the host.
Triggered by selecting a Dockerfile.
This tab manages the utility that allows you to perform plugin backups and/or container image updates. Displays a list of scheduled jobs.
By default, backups will be created of all the subfolders that contain the generated compose files. These subfolders are what the plugin generates every time we create a compose file in the GUI.
In addition, the volumes defined in each container that have a size of less than 1GB will be added to this backup. This size can be customized in the Settings tab.
You can customize any volume within a compose file to be included or excluded in the backup:
# BACKUP
at the end of the line that defines that volume. If the volume is less than 1 GB (or the custom value), you don't need to write anything.:ro
will never be included regardless.# SKIP_BACKUP
at the end of the that defines that volume. If the volume is greater than 1 GB (or the custom value), you do not need to type anything.The backup performs the following process:
The update task performs the following process:
Note | |
At this time, the plug-in backup utility does not resolve variables in volume paths. Define paths using global environment variables only for paths that you do not need to include in a backup. Alternatively you can use symlinks in the compose file. |
Opens a dialog for scheduling backup jobs.
docker image prune -f
command.Opens the edit dialog for the selected task.
Deletes the selected task.
Now executes the selected task. You will not receive an email if you run the scheduled job in this way.
There are three widgets on the dashboard that provide docker container information:
Openmediavault-omvextras version 6.3 and openmediavault-compose version 6.7 have introduced an operation change. Now Portainer is no longer available in omv-extras, if you want to use Portainer you must install it from the compose plugin itself.
If you upgraded the plugin version to openmediavalt-compose 6.7 and had Portainer installed from omv-extras prior to this update, at this point all your containers continue to work as usual and are reachable on their usual IP address and port, but you cannot access to their functionality from the OMV GUI. This procedure will guide you on how to proceed next.
Portainer is just one more container, like the rest, therefore, the situation is the same.
To continue using Portainer, the procedure is to reinstall this container from the openmediavault-compose plugin, for this, you must first stop the Portainer container and remove it (This will not delete the existing configurations in the Portainer, only the container which can then be recreated keeping its current configuration). The way to do this requires running two simple commands on the CLI. Once this is done, the plugin allows you to retrieve the container to the existing path and working exactly as it did before.
If you did not have the plugin installed before the update, you must first install it and configure the Shared folder to store the yaml files.
The procedure to recover Portainer is as follows:
sudo docker stop portainer
sudo docker rm portainer
Note | |
There are two example Portainer yaml files: - The first one is called portainer, it is a standard file to do a fresh installation of Portainer at any time. You should not select this file in this case. - The second one is called portainer-omvextras, this yaml file has been included expressly for this plugin update, so it is already pre-configured so that Portainer continues to work in the same state before the update. This is the file you should select. |
Note | |
This file extracts the Portainer Community Edition image, which is used by most people. If you upgraded to Business Edition replace the line image: portainer/portainer-ce:latest to image: portainer/portainer-ee:latest |
To recover any previously installed containers from the Portainer GUI and redeploy it to the plugin GUI the procedure is the same as for retrieving the Portainer container described above. With the exception that it will be necessary to have the configuration yaml file (stack).
Note | |
This is not an ideal situation, the generated file contains information that is not necessary and can prevent the container from running in some cases. You must locate the errors and correct them. |
To remove Portainer
Notes | |
- Portainer is just a tool to manage other containers, it's just another container. The operation of Portainer is independent of the operation of other containers. - The openmediavault-compose plugin provides the necessary functionality to deploy and manage any container, including Portainer. - Containers deployed from the Portainer GUI using docker-compose will not be able to be managed from the openmediavault-compose GUI. - Containers deployed from the openmediavault-compose GUI will not be able to be managed from the Portainer GUI. - Given the functionality provided by the openmediavault-compose plugin, it is recommended to get rid of Portainer and manage all containers from the openmediavault-compose GUI. Managing from the plugin makes things much simpler and has added benefits. |
This is useful if you need a container to have an IP within your LAN that is different from your server's.
The most common use case for this procedure is installing pi-hole in docker on an OMV server. The reason in this case is that both pi-hole and OMV need the same port to function correctly, port 53. Therefore we need pi-hole to use a different IP on our network to be able to use that port without affecting OMV. There may be other use cases besides pi-hole, depending on the needs of the container you're setting up.
Note that containers using this network will expose all their ports on the LAN, just like any other IP, eg OMV. Docker provides an additional layer of security through port mapping (similar to a firewall). Through this procedure we lose that additional security layer. This does not have to be a problem, it is normal operation in any network, but it is convenient to be aware of this circumstance. Logically it will be useless to map ports in those containers, so you can save that part.
We must create the network previously to be able to define the parameters we need and use it later in the containers. We will call it mynet and we will create it as follows:
192.168.1.0/24
Adapt it to your network.192.168.1.1
Adapt it to your network.192.168.1.240/29
Adapt it to your network.192.168.1.241
to 192.168.1.246
This will allow us to assign IP addresses up to 6 containers, you can expand it if you need more. Any such website can help with this: IP calculatorhost=192.168.1.247
In order for a container to use the created network interface you need to add the following lines to the end of your compose file, assuming docker-compose is version 3 or higher. See the documentation for older versions of docker-compose.
services:
pi-hole:
container_name: "pi-hole"
.
.
networks:
mynet:
ipv4_address: 192.168.1.241
networks:
mynet:
external: true
This sets up the mynet interface for that container and assigns it the IP value 192.168.1.241
within our network, which was the first available. We will still be able to use up to 246
in other containers.
When we start the container we will be able to access its interface from the assigned IP and the usual port.
Once the above is done, in order to avoid overlapping assignable IP ranges, it would be advisable to reduce the IP range of the network's DHCP server. In the case of the previous configuration it could be set to:
This way addresses from 192.168.1.240 onwards will always be available, since the router will not assign any of these IPs if a device requests an IP assignment.
If you use the container itself as a DHCP server, for example with pi-hole, you must disable the DHCP server on your router and adapt the DHCP range in pi-hole accordingly.
What has been applied so far is enough to use pihole, but in the case of other different containers it may be necessary for the container and the host to communicate with each other. Vlans have a limitation, by design they cannot communicate with the host. To overcome this setback and allow communication between the containers and the host, if necessary, we can create a network interface that will act as a bridge between the two.
Warning | |
This procedure creates a binding interface for communication with the host via /etc/network/interfaces when OMV is using netplan. This can generate some conflict in certain circumstances. Do it at your own risk. If you have a suggestion to do this in a safe way you can post it in the forum. |
Running the following commands would create this interface, but this configuration would not be persistent in OMV. On the first server restart it would disappear:
ip link add mynet-host link eno1 type macvlan mode bridge
ip addr add 192.168.1.239/32 dev mynet-host
ip link set mynet-host up
ip route add 192.168.1.224/28 dev mynet-host
This would create a macvlan network interface called mynet-host in bridge mode that would use the IP 192.168.1.239
. The host would use this network interface thanks to the static route set in the 192.168.1.224/28
network range to communicate with the containers.
To make this configuration persistent in OMV we must do it as follows:
nano /etc/network/interfaces.d/99-mynet-host
auto mynet-host
iface mynet-host inet static
pre-up ip link add mynet-host link eno1 type macvlan mode bridge
address 192.168.1.239/32
up ip link set mynet-host up
up ip route add 192.168.1.224/28 dev mynet-host
eno1
with your network interface. You can see it in the GUI under Network > Interfaces.Ctrl+X
and Yes
From now on those settings will be set every time the server is started.
Note | |
If for some reason you need to create many different IPs keep in mind that macvlan uses different MAC addresses for each IP. This can be a problem if your hardware has a limit on the maximum number of MACs for the same physical interface. In that case you can change the configuration to ipvlan. Consult the official docker documentation in this regard to solve other possible configuration problems with ipvlan. |
We, who support the openmediavault project, hope you’ve found this guide to be useful and that you’ll find your openmediavault server to be efficient, easy to use, and enjoyable.
If you found this plugin guide to be helpful, please consider a modest donation to support the hosting costs of this server.
OMV-Extras.org