binhex / arch-sabnzbdvpn

Docker build script for Arch Linux base with SABnzbd, Privoxy and OpenVPN
GNU General Public License v3.0
49 stars 9 forks source link

VPN Enabled cannot connect to webui #37

Closed Serph91P closed 8 months ago

Serph91P commented 9 months ago

Hello there,

hope someone can help me with my issue. Have this container running fine on unraid on my local machine. Now moved alot of my services to a dedicated server to safe on electricity costs.

Basically copied all of the configs and folder structure to the dedicated server to just start everything up and have the same. Problem is sabnzbdvpn is starting and the logs says everything is fine and connect to the vpn, but I cannot connect to the webui. Trying to reverse proxy the webui aswell because security, same here. Funny thing is If I disable the vpn I can connect just fine.

So my guess is that is has to do with the LAN_NETWORK part. Because I am not quite sure what to enter here. Because it is "no" lan. Entered the docker network cidr and reverse proxy network cidr. But still cannot connect to the webui with vpn enabled.

have connected to the docker and tested it is connected to the vpn because ip is changed.

And have waited until it says "SABnzbd process is listening on port 8080"

Sorry if this is hard to understand but English is not my native language.

Log:

Created by...
___.   .__       .__
\_ |__ |__| ____ |  |__   ____ ___  ___
 | __ \|  |/    \|  |  \_/ __ \\  \/  /
 | \_\ \  |   |  \   Y  \  ___/ >    <
 |___  /__|___|  /___|  /\___  >__/\_ \
     \/        \/     \/     \/      \/
   https://hub.docker.com/u/binhex/

2023-10-01 12:30:08.401264 [info] System information Linux sabnzbd-vpn 5.15.0-84-generic #93-Ubuntu SMP Tue Sep 5 17:16:10 UTC 2023 x86_64 GNU/Linux
2023-10-01 12:30:08.424125 [info] PUID defined as '1000'
2023-10-01 12:30:08.509984 [info] PGID defined as '1000'
2023-10-01 12:30:08.561044 [info] UMASK defined as '000'
2023-10-01 12:30:08.586480 [info] Permissions already set for '/config'
2023-10-01 12:30:08.607120 [info] Deleting files in /tmp (non recursive)...
2023-10-01 12:30:08.631755 [info] VPN_ENABLED defined as 'yes'
2023-10-01 12:30:08.652156 [info] VPN_CLIENT defined as 'wireguard'
2023-10-01 12:30:08.671924 [info] VPN_PROV defined as 'pia'
2023-10-01 12:30:08.695117 [info] WireGuard config file (conf extension) is located at /config/wireguard/wg0.conf
2023-10-01 12:30:08.728565 [info] VPN_REMOTE_SERVER defined as 'nl-amsterdam.privacy.network'
2023-10-01 12:30:08.758737 [info] VPN_REMOTE_PORT defined as '1337'
2023-10-01 12:30:08.776462 [info] VPN_DEVICE_TYPE defined as 'wg0'
2023-10-01 12:30:08.793851 [info] VPN_REMOTE_PROTOCOL defined as 'udp'
modprobe: FATAL: Module ip6_tables not found in directory /lib/modules/5.15.0-84-generic
ip6tables v1.8.9 (legacy): can't initialize ip6tables table `filter': Table does not exist (do you need to insmod?)
Perhaps ip6tables or your kernel needs to be upgraded.
2023-10-01 12:30:08.935054 [warn] ip6tables default policies not available, skipping ip6tables drops
2023-10-01 12:30:09.009228 [info] LAN_NETWORK defined as '100.0.0.0/29,172.17.0.0/16'
2023-10-01 12:30:09.029718 [info] NAME_SERVERS defined as '84.200.69.80,37.235.1.174,1.1.1.1,37.235.1.177,84.200.70.40,1.0.0.1'
2023-10-01 12:30:09.050021 [info] VPN_USER defined as 'redacted'
2023-10-01 12:30:09.070293 [info] VPN_PASS defined as 'bNxQ7&redacted'
2023-10-01 12:30:09.090569 [info] STRICT_PORT_FORWARD defined as 'yes'
2023-10-01 12:30:09.110750 [info] ENABLE_PRIVOXY defined as 'no'
2023-10-01 12:30:09.133180 [info] VPN_INPUT_PORTS not defined (via -e VPN_INPUT_PORTS), skipping allow for custom incoming ports
2023-10-01 12:30:09.152829 [info] VPN_OUTPUT_PORTS not defined (via -e VPN_OUTPUT_PORTS), skipping allow for custom outgoing ports
2023-10-01 12:30:29.984760 [info] Starting Supervisor...
2023-10-01 12:30:30,114 INFO Included extra file "/etc/supervisor/conf.d/sabnzbdvpn.conf" during parsing
2023-10-01 12:30:30,114 INFO Set uid to user 0 succeeded
2023-10-01 12:30:30,116 INFO supervisord started with pid 7
2023-10-01 12:30:31,119 INFO spawned: 'start-script' with pid 255
2023-10-01 12:30:31,123 INFO spawned: 'watchdog-script' with pid 256
2023-10-01 12:30:31,123 INFO reaped unknown pid 8 (exit status 0)
2023-10-01 12:30:31,127 DEBG 'start-script' stdout output:
[info] VPN is enabled, beginning configuration of VPN

2023-10-01 12:30:31,128 INFO success: start-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2023-10-01 12:30:31,128 INFO success: watchdog-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2023-10-01 12:30:31,130 DEBG 'start-script' stdout output:
[info] Adding 84.200.69.80 to /etc/resolv.conf

2023-10-01 12:30:31,133 DEBG 'start-script' stdout output:
[info] Adding 37.235.1.174 to /etc/resolv.conf

2023-10-01 12:30:31,135 DEBG 'start-script' stdout output:
[info] Adding 1.1.1.1 to /etc/resolv.conf

2023-10-01 12:30:31,139 DEBG 'start-script' stdout output:
[info] Adding 37.235.1.177 to /etc/resolv.conf

2023-10-01 12:30:31,142 DEBG 'start-script' stdout output:
[info] Adding 84.200.70.40 to /etc/resolv.conf

2023-10-01 12:30:31,144 DEBG 'start-script' stdout output:
[info] Adding 1.0.0.1 to /etc/resolv.conf

2023-10-01 12:30:31,354 DEBG 'start-script' stdout output:
[info] Token generated for PIA wireguard authentication

2023-10-01 12:30:31,357 DEBG 'start-script' stdout output:
[info] Trying to connect to the PIA WireGuard API on 'nl-amsterdam.privacy.network'...

2023-10-01 12:30:31,466 DEBG 'start-script' stdout output:
[info] Default route for container is 172.17.0.1

2023-10-01 12:30:31,617 DEBG 'start-script' stdout output:
[info] Docker network defined as    172.17.0.0/16

2023-10-01 12:30:31,620 DEBG 'start-script' stdout output:
[info] Adding 100.0.0.0/29 as route via docker eth0

2023-10-01 12:30:31,624 DEBG 'start-script' stdout output:
[info] Adding 172.17.0.0/16 as route via docker eth0

2023-10-01 12:30:31,625 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists

2023-10-01 12:30:31,625 DEBG 'start-script' stdout output:
[info] ip route defined as follows...
--------------------

2023-10-01 12:30:31,626 DEBG 'start-script' stdout output:
default via 172.17.0.1 dev eth0 
100.0.0.0/29 via 172.17.0.1 dev eth0 

2023-10-01 12:30:31,626 DEBG 'start-script' stdout output:
100.0.0.120/29 dev eth1 proto kernel scope link src 100.0.0.123 
172.17.0.0/16 dev eth0 proto kernel scope link src 172.17.0.7 
local 100.0.0.123 dev eth1 table local proto kernel scope host src 100.0.0.123 
broadcast 100.0.0.127 dev eth1 table local proto kernel scope link src 100.0.0.123 
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1 
local 172.17.0.7 dev eth0 table local proto kernel scope host src 172.17.0.7 
broadcast 172.17.255.255 dev eth0 table local proto kernel scope link src 172.17.0.7 

2023-10-01 12:30:31,626 DEBG 'start-script' stdout output:
--------------------

2023-10-01 12:30:31,630 DEBG 'start-script' stdout output:
iptable_mangle         16384  0
ip_tables              32768  3 iptable_filter,iptable_raw,iptable_mangle
x_tables               53248  13 xt_conntrack,iptable_filter,nft_compat,xt_tcpudp,xt_addrtype,xt_nat,xt_comment,xt_connmark,iptable_raw,ip_tables,xt_MASQUERADE,iptable_mangle,xt_mark

2023-10-01 12:30:31,630 DEBG 'start-script' stdout output:
[info] iptable_mangle support detected, adding fwmark for tables

2023-10-01 12:30:31,712 DEBG 'start-script' stdout output:
[info] iptables defined as follows...
--------------------

2023-10-01 12:30:31,713 DEBG 'start-script' stdout output:
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT DROP
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8090 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8090 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i wg0 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8090 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8090 -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o wg0 -j ACCEPT

2023-10-01 12:30:31,714 DEBG 'start-script' stdout output:
--------------------

2023-10-01 12:30:31,717 DEBG 'start-script' stdout output:
[info] Rerunning wireguard authentication...

2023-10-01 12:30:31,896 DEBG 'start-script' stdout output:
[info] Token generated for PIA wireguard authentication

2023-10-01 12:30:31,903 DEBG 'start-script' stdout output:
[info] Trying to connect to the PIA WireGuard API on 'nl-amsterdam.privacy.network'...

2023-10-01 12:30:32,023 DEBG 'start-script' stdout output:
[info] Default route for container is 172.17.0.1

2023-10-01 12:30:32,178 DEBG 'start-script' stdout output:
[info] Docker network defined as    172.17.0.0/16

2023-10-01 12:30:32,182 DEBG 'start-script' stdout output:
[info] Adding 100.0.0.0/29 as route via docker eth0

2023-10-01 12:30:32,183 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists

2023-10-01 12:30:32,186 DEBG 'start-script' stdout output:
[info] Adding 172.17.0.0/16 as route via docker eth0

2023-10-01 12:30:32,187 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists

2023-10-01 12:30:32,187 DEBG 'start-script' stdout output:
[info] ip route defined as follows...
--------------------

2023-10-01 12:30:32,188 DEBG 'start-script' stdout output:
default via 172.17.0.1 dev eth0 table 8080_sabnzbd 
default via 172.17.0.1 dev eth0 table 8090_sabnzbd 
default via 172.17.0.1 dev eth0 
100.0.0.0/29 via 172.17.0.1 dev eth0 

2023-10-01 12:30:32,188 DEBG 'start-script' stdout output:
100.0.0.120/29 dev eth1 proto kernel scope link src 100.0.0.123 
172.17.0.0/16 dev eth0 proto kernel scope link src 172.17.0.7 
local 100.0.0.123 dev eth1 table local proto kernel scope host src 100.0.0.123 
broadcast 100.0.0.127 dev eth1 table local proto kernel scope link src 100.0.0.123 
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1 
local 172.17.0.7 dev eth0 table local proto kernel scope host src 172.17.0.7 
broadcast 172.17.255.255 dev eth0 table local proto kernel scope link src 172.17.0.7 

2023-10-01 12:30:32,189 DEBG 'start-script' stdout output:
--------------------

2023-10-01 12:30:32,193 DEBG 'start-script' stdout output:
iptable_mangle         16384  1
ip_tables              32768  5 iptable_filter,iptable_raw,iptable_mangle
x_tables               53248  13 xt_conntrack,iptable_filter,nft_compat,xt_tcpudp,xt_addrtype,xt_nat,xt_comment,xt_connmark,iptable_raw,ip_tables,xt_MASQUERADE,iptable_mangle,xt_mark

2023-10-01 12:30:32,193 DEBG 'start-script' stdout output:
[info] iptable_mangle support detected, adding fwmark for tables

2023-10-01 12:30:32,196 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists

2023-10-01 12:30:32,197 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists

2023-10-01 12:30:32,277 DEBG 'start-script' stdout output:
[info] iptables defined as follows...
--------------------

2023-10-01 12:30:32,278 DEBG 'start-script' stdout output:
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT DROP
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8090 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8090 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i wg0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8090 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8090 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i wg0 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8090 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8090 -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o wg0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8090 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8090 -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o wg0 -j ACCEPT

2023-10-01 12:30:32,283 DEBG 'start-script' stdout output:
--------------------

2023-10-01 12:30:32,283 DEBG 'start-script' stdout output:
[info] Attempting to bring WireGuard interface 'up'...

2023-10-01 12:30:32,290 DEBG 'start-script' stderr output:
Warning: `/config/wireguard/wg0.conf' is world accessible

2023-10-01 12:30:32,295 DEBG 'start-script' stderr output:
[#] ip link add wg0 type wireguard

2023-10-01 12:30:32,297 DEBG 'start-script' stderr output:
[#] wg setconf wg0 /dev/fd/63

2023-10-01 12:30:32,299 DEBG 'start-script' stderr output:
[#] ip -4 address add 10.39.184.90 dev wg0

2023-10-01 12:30:32,303 DEBG 'start-script' stderr output:
[#] ip link set mtu 1420 up dev wg0

2023-10-01 12:30:32,310 DEBG 'start-script' stderr output:
[#] wg set wg0 fwmark 51820

2023-10-01 12:30:32,311 DEBG 'start-script' stderr output:
[#] ip -4 route add 0.0.0.0/0 dev wg0 table 51820

2023-10-01 12:30:32,312 DEBG 'start-script' stderr output:
[#] ip -4 rule add not fwmark 51820 table 51820

2023-10-01 12:30:32,313 DEBG 'start-script' stderr output:
[#] ip -4 rule add table main suppress_prefixlength 0

2023-10-01 12:30:32,316 DEBG 'start-script' stderr output:
[#] sysctl -q net.ipv4.conf.all.src_valid_mark=1

2023-10-01 12:30:32,317 DEBG 'start-script' stderr output:
[#] iptables-restore -n

2023-10-01 12:30:32,318 DEBG 'start-script' stderr output:
[#] '/root/wireguardup.sh'

2023-10-01 12:30:33,390 DEBG 'start-script' stdout output:
[info] Application does not require external IP address, skipping external IP address detection

2023-10-01 12:30:33,393 DEBG 'start-script' stdout output:
[info] WireGuard interface 'up'

2023-10-01 12:30:33,396 DEBG 'start-script' stdout output:
[info] Application does not require port forwarding, skipping incoming port assignment

2023-10-01 12:30:33,441 DEBG 'watchdog-script' stdout output:
[info] SABnzbd not running

2023-10-01 12:30:33,441 DEBG 'watchdog-script' stdout output:
[info] Attempting to start SABnzbd...

2023-10-01 12:30:34,058 DEBG 'watchdog-script' stdout output:
[info] SABnzbd process started
[info] Waiting for SABnzbd process to start listening on port 8080...

2023-10-01 12:30:34,179 DEBG 'watchdog-script' stdout output:
[info] SABnzbd process is listening on port 8080                       
Serph91P commented 8 months ago

fixed was not patient enough on a slow system.