If you have aufs support there is no reason to change to devicemapper.
Most of the time, the issue is that the server has no aufs support on the current kernel.
It seems that you have support, but to make sure please try, grep aufs /proc/aufs
For the rest of what you sent, seems fine.
Cheers.
It says there’s no such file or dir. Are you sure that’s the right path to check for aufs support?
➜ ~ grep aufs /proc/aufs
grep: /proc/aufs: No such file or directory
I have all the extras installed
➜ ~ sudo apt-get install linux-image-extra-$(uname -r) linux-image-extra-virtual
Reading package lists... Done
Building dependency tree
Reading state information... Done
linux-image-extra-4.4.0-66-generic is already the newest version (4.4.0-66.87).
linux-image-extra-virtual is already the newest version (4.4.0.66.70).
The following packages were automatically installed and are no longer required:
libblas-common libblas3 liblinear3 liblua5.2-0 lua-lpeg ndiff python-bs4 python-html5lib python-lxml
Use 'sudo apt autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 7 not upgraded.
➜ ~
cat /etc/apache2/sites-available/office.domain.com.conf
<VirtualHost *:443>
ServerName office.domain.com:443
# SSL configuration, you may want to take the easy route instead and use Lets Encrypt!
SSLEngine on
SSLCertificateChainFile /etc/letsencrypt/live/office.domain.com/chain.pem
SSLCertificateFile /etc/letsencrypt/live/office.domain.com/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/office.domain.com/privkey.pem
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
SSLHonorCipherOrder on
# Encoded slashes need to be allowed
AllowEncodedSlashes NoDecode
# Container uses a unique non-signed certificate
SSLProxyEngine On
SSLProxyVerify None
SSLProxyCheckPeerCN Off
SSLProxyCheckPeerName Off
# keep the host
ProxyPreserveHost On
# static html, js, images, etc. served from loolwsd
# loleaflet is the client part of LibreOffice Online
ProxyPass /loleaflet https://127.0.0.1:9980/loleaflet retry=0
ProxyPassReverse /loleaflet https://127.0.0.1:9980/loleaflet
# WOPI discovery URL
ProxyPass /hosting/discovery https://127.0.0.1:9980/hosting/discovery retry=0
ProxyPassReverse /hosting/discovery https://127.0.0.1:9980/hosting/discovery
# Main websocket
ProxyPassMatch "/lool/(.*)/ws$" wss://127.0.0.1:9980/lool/$1/ws nocanon
# Admin Console websocket
ProxyPass /lool/adminws wss://127.0.0.1:9980/lool/adminws
# Download as, Fullscreen presentation and Image upload operations
ProxyPass /lool https://127.0.0.1:9980/lool
ProxyPassReverse /lool https://127.0.0.1:9980/lool
</VirtualHost>
➜ ~
I had some issues before but resolved it. See thread
Send me a PM with your nextcloud domain, i’ll allow it to run my instance and we can check from there.
Your configuration seems fine.
The only things i’m guessing is that you have old ssl certs on one side office or nextcloud domain, or maybe docker was run with errors, the part with