OMV6 With qbittorrent and wireguard?
-
- OMV 6.x
- goodtime
-
-
QBT_WEBUI_PORT is the internal port used by the Docker network, _NOT_ the host machine, which is 7070 in your example. 7070 is irrelevant here, the focus is 8080. You don't want 2 containers listening on the same port.
-
QBT_WEBUI_PORT is the internal port used by the Docker network, _NOT_ the host machine, which is 7070 in your example. 7070 is irrelevant here, the focus is 8080. You don't want 2 containers listening on the same port.
If the container is on a docker network, the internal port is irrelevant. It’s the mapped host port that matters, as that is where the containers and/or host can overlap.
I have several containers that have the same internal port, and they are even on the same docker network, but the mapped host port is different or else the containers will not even start, let alone try to listen on the same port.
-
-
I don't use compose but I know it has some great convenience features, but I'm not sure if it's magic runs deep enough to fix this. Remember, both web UI ports are on 8080.
Bash
Display More#!/bin/bash docker run -d \ --name="qbittorrent" \ `# set up volumes and other stuff` \ `# now bind ports for qbittorrent's webui'` \ `# or will this be Sabnzbd's webui?'` \ -p 7070:8080 \ --restart unless-stopped \ qbittorrentvpn docker run -d \ --name=sabnzbd \ `# Again, set up volumes and other stuff` \ `# now use qbittorrent as a proxy'` \ --network=container:qbittorrent\ --restart unless-stopped \ lscr.io/linuxserver/sabnzbd:latest
-
I don't use compose but I know it has some great convenience features, but I'm not sure if it's magic runs deep enough to fix this. Remember, both web UI ports are on 8080.
That may be, but the container internals are isolated from each other. It doesn't matter if they are started by compose or run, the internal isolation is the same. Having the port definition in the containers keeps them from overlapping on the host "listening" ports.
You can convert between the two with something composerize and decomposerize, or just rewrite them yourself.
The only time that it would matter is if you are rebuilding a container from scratch to hold more than the one application. Then the applications are not isolated from each other.
-
QBT_WEBUI_PORT is the internal port used by the Docker network, _NOT_ the host machine, which is 7070 in your example. 7070 is irrelevant here, the focus is 8080. You don't want 2 containers listening on the same port.
I think you may be wrong here. The QBT_WEBUI_PORT is the port used by the web server used in the container and is exposed to the docker network. It is not used by the docker network. That is a very important distinction.
Each container on the docker network gets a docker network ip address as if it was a computer on a normal network, and just like a normal network you can have the same port in use by multiple containers (or computers on a network).
The ip address or host name determines where the traffic gets sent to (or docker container name with docker).
The port mapping and network bridge mode in compose and/or run, act sort of like like a router, allowing you to bridge networks (docker network to host in this case). Just like a router there is a single ip address that the traffic has to funnel through (the host) and just like a router (without a reverse proxy in line which would change the route based hostname allowing the ports to be kept in the private side of the route), the ports have to be exposed on the "public side" (the host) so ports need to be remapped so that they don't overlap.
-
-
I've created 1 final image before qBittorent v5.0 (final).
GitHub - coldsilk/docker-qbittorrentvpn: Docker container which runs a qBittorent-nox client with an optional WireGuard or OpenVPN connectionDocker container which runs a qBittorent-nox client with an optional WireGuard or OpenVPN connection - coldsilk/docker-qbittorrentvpngithub.comPull with docker pull ... coldsilk/docker-qbittorrent:latest
Very, VERY notably is the ability to use qBittorrent's API to issue a shutdown via ip:port/api/v2/app/shutdown I learned a bit about private trackers as well because without that shutdown command, there's seemingly no way to shutdown qbittorrent-nox cleanly. It's _SUPPOSED_ to shutdown cleanly on SIGABRT, but it most certainly doesn't. Without a clean shutdown, apparently private trackers can't collect usage, which is seemingly a big deal in the private tracker world. Also without it you loose a little download data :-/
I've posted some of the changes before, but here is all of them in totality (I think).
- Option of a VPN conf switcher incase you have a free/unstable VPN
- Shutdown of qBittorrent with cURL to save downloaded torrent data. This is also apparently important for trackers that you want to collect your usage such as quota based private trackers
- Option to set the "Network Interface:" inside qBittorrent to the VPN adapter, ie. wg0 or tun0 or tap0
- Option to use OpenVPN without having a "credentials.conf" file
- Option to change qBittorrent's Web UI port and Torrenting port
- Health check can now go N ping failures to N servers before restarting
- Default username and password is back to admin/adminadmin
- Option to auto-strip ipv6 addresses in wg0.conf
- Option to write a file to /config while the internet is seemingly down
- Option to run a script when the health check succeeds and/or fails
- Added a simple .bash script to send .torrents and magnets (it's copied to /config)
- Added a reaper to restart the container if not connected by N seconds (default: 30).
- Option to move the VPN config files into the container
- Option to pass VPN options to OpenVPN
- Option to set timezone
- Option of a VPN conf switcher incase you have a free/unstable VPN
-
New Release from linuxserver/qbittorrent (don't know if it comes from upstream qbittorrent) now creates a random Password that is mentioned in the log:
CodeThe web UI is at `<your-ip>:8080` and a temporary password for the `admin` user will be printed to the container log on startup. You must then change username/password in the web UI section of settings. If you do not change the password a new one will be generated every time the container starts.
nothing is showing in my log jsut started over from new and there is nothing in the log about a password.
Code
Display More04/30/2024 09:41:24 AM 2024-04-30 08:41:24.088061 [INFO] VPN_ENABLED defined as 'yes' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.120896 [INFO] LEGACY_IPTABLES is set to '' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.152882 [INFO] Not making any changes to iptables version 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.186342 [INFO] The container is currently running iptables v1.8.7 (nf_tables). 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.219099 [INFO] VPN_TYPE defined as 'wireguard' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.256755 [INFO] WireGuard config file is found at /config/wireguard/wg0.conf 04/30/2024 09:41:24 AM dos2unix: converting file /config/wireguard/wg0.conf to Unix format... 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.292729 [INFO] VPN remote line defined as '37.120.153.42:1443' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.326866 [INFO] VPN_REMOTE defined as '37.120.153.42' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.361167 [INFO] VPN_PORT defined as '1443' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.393153 [INFO] VPN_PROTOCOL set as 'udp', since WireGuard is always udp. 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.425236 [INFO] VPN_DEVICE_TYPE set as 'wg0', since WireGuard will always be wg0. 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.459517 [INFO] LAN_NETWORK defined as '10.0.0.0/24' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.494221 [INFO] NAME_SERVERS defined as '1.1.1.1' 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.528735 [INFO] Adding 1.1.1.1 to resolv.conf 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.561457 [INFO] Starting WireGuard... 04/30/2024 09:41:24 AM Warning: `/config/wireguard/wg0.conf' is world accessible 04/30/2024 09:41:24 AM [#] ip link add wg0 type wireguard 04/30/2024 09:41:24 AM [#] wg setconf wg0 /dev/fd/63 04/30/2024 09:41:24 AM [#] ip -4 address add 10.13.125.129/24 dev wg0 04/30/2024 09:41:24 AM [#] ip link set mtu 1390 up dev wg0 04/30/2024 09:41:24 AM [#] resolvconf -a wg0 -m 0 -x 04/30/2024 09:41:24 AM [#] wg set wg0 fwmark 51820 04/30/2024 09:41:24 AM [#] ip -4 route add 0.0.0.0/0 dev wg0 table 51820 04/30/2024 09:41:24 AM [#] ip -4 rule add not fwmark 51820 table 51820 04/30/2024 09:41:24 AM [#] ip -4 rule add table main suppress_prefixlength 0 04/30/2024 09:41:24 AM [#] iptables-restore -n 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.889547 [INFO] Docker network defined as 172.19.0.0/16 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.926727 [INFO] Adding 10.0.0.0/24 as route via docker eth0 04/30/2024 09:41:24 AM 2024-04-30 08:41:24.961105 [INFO] ip route defined as follows... 04/30/2024 09:41:24 AM -------------------- 04/30/2024 09:41:24 AM default via 172.19.0.1 dev eth0 04/30/2024 09:41:24 AM 10.0.0.0/24 via 172.19.0.1 dev eth0 04/30/2024 09:41:24 AM 10.13.125.0/24 dev wg0 proto kernel scope link src 10.13.125.129 04/30/2024 09:41:24 AM 172.19.0.0/16 dev eth0 proto kernel scope link src 172.19.0.2 04/30/2024 09:41:24 AM -------------------- 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.142190 [INFO] iptables defined as follows... 04/30/2024 09:41:25 AM -------------------- 04/30/2024 09:41:25 AM -P INPUT DROP 04/30/2024 09:41:25 AM -P FORWARD ACCEPT 04/30/2024 09:41:25 AM -P OUTPUT DROP 04/30/2024 09:41:25 AM -A INPUT -i wg0 -j ACCEPT 04/30/2024 09:41:25 AM -A INPUT -s 172.19.0.0/16 -d 172.19.0.0/16 -j ACCEPT 04/30/2024 09:41:25 AM -A INPUT -i eth0 -p udp -m udp --sport 1443 -j ACCEPT 04/30/2024 09:41:25 AM -A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT 04/30/2024 09:41:25 AM -A INPUT -i eth0 -p tcp -m tcp --sport 8080 -j ACCEPT 04/30/2024 09:41:25 AM -A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT 04/30/2024 09:41:25 AM -A INPUT -i lo -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -o wg0 -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -s 172.19.0.0/16 -d 172.19.0.0/16 -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -o eth0 -p udp -m udp --dport 1443 -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -o eth0 -p tcp -m tcp --dport 8080 -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT 04/30/2024 09:41:25 AM -A OUTPUT -o lo -j ACCEPT 04/30/2024 09:41:25 AM -------------------- 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.189806 [WARNING] qBittorrent.conf is missing, this is normal for the first launch! Copying template. 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.227648 [INFO] Python3 is already installed, nothing to do. 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.261005 [WARNING] ENABLE_SSL is set to 'no', SSL is not enabled. This could cause issues with logging if other apps use the same Cookie name (SID). 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.292644 [WARNING] Removing the SSL configuration from the config file... 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.327591 [INFO] A group with PGID 1000 does not exist within this container, adding a group called 'qbittorrent' with PGID 1000 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.385887 [INFO] An user with PUID 1000 does not exist within this container, adding an user called 'qbittorrent user' with PUID 1000 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.469252 [INFO] UMASK defined as '022' 04/30/2024 09:41:25 AM 2024-04-30 08:41:25.503171 [INFO] Starting qBittorrent daemon... 04/30/2024 09:41:25 AM Log file /config/qBittorrent/data/logs/qbittorrent.log doesn't exist. Creating it... 04/30/2024 09:41:25 AM Logfile created. Logging to /config/qBittorrent/data/logs/qbittorrent.log 04/30/2024 09:41:26 AM 2024-04-30 08:41:26.550815 [INFO] Started qBittorrent daemon successfully... 04/30/2024 09:41:26 AM 2024-04-30 08:41:26.585434 [INFO] qBittorrent PID: 272 04/30/2024 09:41:26 AM 2024-04-30 08:41:26.619903 [INFO] RESTART_CONTAINER defined as 'yes' 04/30/2024 09:41:26 AM 2024-04-30 08:41:26.652834 [INFO] HEALTH_CHECK_AMOUNT is set to 10
-
nothing is showing in my log jsut started over from new and there is nothing in the log about a password.
Which image are you using?
This is showing VPN so, not the "normal" version.
If it's gderf image, I don't think he based it on the linuxserver one. -
-
The log is in the qBittorrent directory, not the dicker log. If you don't see it there try:
admin
adminadmin
-
Which image are you using?
This is showing VPN so, not the "normal" version.
If it's gderf image, I don't think he based it on the linuxserver one.gderf image.
The log is in the qBittorrent directory, not the dicker log. If you don't see it there try:
admin
adminadmin
Nope its not default anymore.
P.S your photo is disgusting why do you have someone licking shit?
-
anyone any idea what the username and password is? Still not login no a new setup.
-
-
anyone any idea what the username and password is? Still not login no a new setup.
It's whatever you set when you changed it. Reset it if you don't know it.
-
It's whatever you set when you changed it. Reset it if you don't know it.
its a new setup ive not changed it at all.
-
its a new setup ive not changed it at all.
Like gderf pointed, you should follow the instructions there to reset the WebGUI password for that specific image:
Web UI password locked on qBittorrent NO X (qbittorrent nox) · qbittorrent/qBittorrent Wiki (github.com)It's well instructed there.
-
-
Like gderf pointed, you should follow the instructions there to reset the WebGUI password for that specific image:
Web UI password locked on qBittorrent NO X (qbittorrent nox) · qbittorrent/qBittorrent Wiki (github.com)It's well instructed there.
still does not work
Code
Display More[BitTorrent] Session\BTProtocol=Both Session\DefaultSavePath=/downloads Session\Port=8999 Session\QueueingSystemEnabled=false Session\TempPath=/downloads/temp Session\TempPathEnabled=true Session\UseRandomPort=true [Meta] MigrationVersion=6 [Preferences] WebUI\HostHeaderValidation=false WebUI\Port=8080 WebUI\Username=admin
-
-
I just had to change my $3/month vpn provider that I have been using for about 10 years (frootvpn) to another one as the old one seems to have disappeared 2 days ago.
While setting up the new $3/month provider (purevpn) in the qbittorrent-vpn container I figured it might be prudent to check the vpn speed, ip address and check for DNS leaks, just to be 100% comfortable.
So I bashed into the container and ran a speedtest and a curl ifconfig.co to confirm the ip address, and grabbed this to check for DNS leaks. While easy to install and run, it might be a good script to include in the image build.
GitHub - macvk/dnsleaktest: An open source script tests VPN connection for DNS Leak.An open source script tests VPN connection for DNS Leak. - macvk/dnsleaktestgithub.com -
-
I am no longer maintaining my gderf/qbittorrentvpn image because one of the tools used in building the image is broken.
I have switched to this image instead, but I do not build it myself, I just take what the author offers.
GitHub - Trigus42/alpine-qbittorrentvpn: Multiarch docker image with the latest qBittorrent-nox client (WEB UI) and WireGuard/OpenVPN tunnelMultiarch docker image with the latest qBittorrent-nox client (WEB UI) and WireGuard/OpenVPN tunnel - Trigus42/alpine-qbittorrentvpngithub.com -
I am no longer maintaining my gderf/qbittorrentvpn image because one of the tools used in building the image is broken.
I have switched to this image instead, but I do not build it myself, I just take what the author offers.
https://github.com/Trigus42/alpine-qbittorrentvpn
That's too bad. That dyonr one that you took over and modified was tried and true.
Now i might have to get nervous for a little while again.
Participate now!
Don’t have an account yet? Register yourself now and be a part of our community!