hope someone can help me with my issue. Have this container running fine on unraid on my local machine. Now moved alot of my services to a dedicated server to safe on electricity costs.
Basically copied all of the configs and folder structure to the dedicated server to just start everything up and have the same.
Problem is sabnzbdvpn is starting and the logs says everything is fine and connect to the vpn, but I cannot connect to the webui.
Trying to reverse proxy the webui aswell because security, same here. Funny thing is If I disable the vpn I can connect just fine.
So my guess is that is has to do with the LAN_NETWORK part. Because I am not quite sure what to enter here. Because it is "no" lan. Entered the docker network cidr and reverse proxy network cidr. But still cannot connect to the webui with vpn enabled.
have connected to the docker and tested it is connected to the vpn because ip is changed.
Sorry if this is hard to understand but English is not my native language.
Created by...
___. .__ .__
\_ |__ |__| ____ | |__ ____ ___ ___
| __ \| |/ \| | \_/ __ \\ \/ /
| \_\ \ | | \ Y \ ___/ > <
|___ /__|___| /___| /\___ >__/\_ \
\/ \/ \/ \/ \/
https://hub.docker.com/u/binhex/
2023-10-01 12:30:08.401264 [info] System information Linux sabnzbd-vpn 5.15.0-84-generic #93-Ubuntu SMP Tue Sep 5 17:16:10 UTC 2023 x86_64 GNU/Linux
2023-10-01 12:30:08.424125 [info] PUID defined as '1000'
2023-10-01 12:30:08.509984 [info] PGID defined as '1000'
2023-10-01 12:30:08.561044 [info] UMASK defined as '000'
2023-10-01 12:30:08.586480 [info] Permissions already set for '/config'
2023-10-01 12:30:08.607120 [info] Deleting files in /tmp (non recursive)...
2023-10-01 12:30:08.631755 [info] VPN_ENABLED defined as 'yes'
2023-10-01 12:30:08.652156 [info] VPN_CLIENT defined as 'wireguard'
2023-10-01 12:30:08.671924 [info] VPN_PROV defined as 'pia'
2023-10-01 12:30:08.695117 [info] WireGuard config file (conf extension) is located at /config/wireguard/wg0.conf
2023-10-01 12:30:08.728565 [info] VPN_REMOTE_SERVER defined as 'nl-amsterdam.privacy.network'
2023-10-01 12:30:08.758737 [info] VPN_REMOTE_PORT defined as '1337'
2023-10-01 12:30:08.776462 [info] VPN_DEVICE_TYPE defined as 'wg0'
2023-10-01 12:30:08.793851 [info] VPN_REMOTE_PROTOCOL defined as 'udp'
modprobe: FATAL: Module ip6_tables not found in directory /lib/modules/5.15.0-84-generic
ip6tables v1.8.9 (legacy): can't initialize ip6tables table `filter': Table does not exist (do you need to insmod?)
Perhaps ip6tables or your kernel needs to be upgraded.
2023-10-01 12:30:08.935054 [warn] ip6tables default policies not available, skipping ip6tables drops
2023-10-01 12:30:09.009228 [info] LAN_NETWORK defined as '100.0.0.0/29,172.17.0.0/16'
2023-10-01 12:30:09.029718 [info] NAME_SERVERS defined as '84.200.69.80,37.235.1.174,1.1.1.1,37.235.1.177,84.200.70.40,1.0.0.1'
2023-10-01 12:30:09.050021 [info] VPN_USER defined as 'redacted'
2023-10-01 12:30:09.070293 [info] VPN_PASS defined as 'bNxQ7&redacted'
2023-10-01 12:30:09.090569 [info] STRICT_PORT_FORWARD defined as 'yes'
2023-10-01 12:30:09.110750 [info] ENABLE_PRIVOXY defined as 'no'
2023-10-01 12:30:09.133180 [info] VPN_INPUT_PORTS not defined (via -e VPN_INPUT_PORTS), skipping allow for custom incoming ports
2023-10-01 12:30:09.152829 [info] VPN_OUTPUT_PORTS not defined (via -e VPN_OUTPUT_PORTS), skipping allow for custom outgoing ports
2023-10-01 12:30:29.984760 [info] Starting Supervisor...
2023-10-01 12:30:30,114 INFO Included extra file "/etc/supervisor/conf.d/sabnzbdvpn.conf" during parsing
2023-10-01 12:30:30,114 INFO Set uid to user 0 succeeded
2023-10-01 12:30:30,116 INFO supervisord started with pid 7
2023-10-01 12:30:31,119 INFO spawned: 'start-script' with pid 255
2023-10-01 12:30:31,123 INFO spawned: 'watchdog-script' with pid 256
2023-10-01 12:30:31,123 INFO reaped unknown pid 8 (exit status 0)
2023-10-01 12:30:31,127 DEBG 'start-script' stdout output:
[info] VPN is enabled, beginning configuration of VPN
2023-10-01 12:30:31,128 INFO success: start-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2023-10-01 12:30:31,128 INFO success: watchdog-script entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)
2023-10-01 12:30:31,130 DEBG 'start-script' stdout output:
[info] Adding 84.200.69.80 to /etc/resolv.conf
2023-10-01 12:30:31,133 DEBG 'start-script' stdout output:
[info] Adding 37.235.1.174 to /etc/resolv.conf
2023-10-01 12:30:31,135 DEBG 'start-script' stdout output:
[info] Adding 1.1.1.1 to /etc/resolv.conf
2023-10-01 12:30:31,139 DEBG 'start-script' stdout output:
[info] Adding 37.235.1.177 to /etc/resolv.conf
2023-10-01 12:30:31,142 DEBG 'start-script' stdout output:
[info] Adding 84.200.70.40 to /etc/resolv.conf
2023-10-01 12:30:31,144 DEBG 'start-script' stdout output:
[info] Adding 1.0.0.1 to /etc/resolv.conf
2023-10-01 12:30:31,354 DEBG 'start-script' stdout output:
[info] Token generated for PIA wireguard authentication
2023-10-01 12:30:31,357 DEBG 'start-script' stdout output:
[info] Trying to connect to the PIA WireGuard API on 'nl-amsterdam.privacy.network'...
2023-10-01 12:30:31,466 DEBG 'start-script' stdout output:
[info] Default route for container is 172.17.0.1
2023-10-01 12:30:31,617 DEBG 'start-script' stdout output:
[info] Docker network defined as 172.17.0.0/16
2023-10-01 12:30:31,620 DEBG 'start-script' stdout output:
[info] Adding 100.0.0.0/29 as route via docker eth0
2023-10-01 12:30:31,624 DEBG 'start-script' stdout output:
[info] Adding 172.17.0.0/16 as route via docker eth0
2023-10-01 12:30:31,625 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists
2023-10-01 12:30:31,625 DEBG 'start-script' stdout output:
[info] ip route defined as follows...
--------------------
2023-10-01 12:30:31,626 DEBG 'start-script' stdout output:
default via 172.17.0.1 dev eth0
100.0.0.0/29 via 172.17.0.1 dev eth0
2023-10-01 12:30:31,626 DEBG 'start-script' stdout output:
100.0.0.120/29 dev eth1 proto kernel scope link src 100.0.0.123
172.17.0.0/16 dev eth0 proto kernel scope link src 172.17.0.7
local 100.0.0.123 dev eth1 table local proto kernel scope host src 100.0.0.123
broadcast 100.0.0.127 dev eth1 table local proto kernel scope link src 100.0.0.123
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
local 172.17.0.7 dev eth0 table local proto kernel scope host src 172.17.0.7
broadcast 172.17.255.255 dev eth0 table local proto kernel scope link src 172.17.0.7
2023-10-01 12:30:31,626 DEBG 'start-script' stdout output:
--------------------
2023-10-01 12:30:31,630 DEBG 'start-script' stdout output:
iptable_mangle 16384 0
ip_tables 32768 3 iptable_filter,iptable_raw,iptable_mangle
x_tables 53248 13 xt_conntrack,iptable_filter,nft_compat,xt_tcpudp,xt_addrtype,xt_nat,xt_comment,xt_connmark,iptable_raw,ip_tables,xt_MASQUERADE,iptable_mangle,xt_mark
2023-10-01 12:30:31,630 DEBG 'start-script' stdout output:
[info] iptable_mangle support detected, adding fwmark for tables
2023-10-01 12:30:31,712 DEBG 'start-script' stdout output:
[info] iptables defined as follows...
--------------------
2023-10-01 12:30:31,713 DEBG 'start-script' stdout output:
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT DROP
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8090 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8090 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i wg0 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8090 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8090 -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o wg0 -j ACCEPT
2023-10-01 12:30:31,714 DEBG 'start-script' stdout output:
--------------------
2023-10-01 12:30:31,717 DEBG 'start-script' stdout output:
[info] Rerunning wireguard authentication...
2023-10-01 12:30:31,896 DEBG 'start-script' stdout output:
[info] Token generated for PIA wireguard authentication
2023-10-01 12:30:31,903 DEBG 'start-script' stdout output:
[info] Trying to connect to the PIA WireGuard API on 'nl-amsterdam.privacy.network'...
2023-10-01 12:30:32,023 DEBG 'start-script' stdout output:
[info] Default route for container is 172.17.0.1
2023-10-01 12:30:32,178 DEBG 'start-script' stdout output:
[info] Docker network defined as 172.17.0.0/16
2023-10-01 12:30:32,182 DEBG 'start-script' stdout output:
[info] Adding 100.0.0.0/29 as route via docker eth0
2023-10-01 12:30:32,183 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists
2023-10-01 12:30:32,186 DEBG 'start-script' stdout output:
[info] Adding 172.17.0.0/16 as route via docker eth0
2023-10-01 12:30:32,187 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists
2023-10-01 12:30:32,187 DEBG 'start-script' stdout output:
[info] ip route defined as follows...
--------------------
2023-10-01 12:30:32,188 DEBG 'start-script' stdout output:
default via 172.17.0.1 dev eth0 table 8080_sabnzbd
default via 172.17.0.1 dev eth0 table 8090_sabnzbd
default via 172.17.0.1 dev eth0
100.0.0.0/29 via 172.17.0.1 dev eth0
2023-10-01 12:30:32,188 DEBG 'start-script' stdout output:
100.0.0.120/29 dev eth1 proto kernel scope link src 100.0.0.123
172.17.0.0/16 dev eth0 proto kernel scope link src 172.17.0.7
local 100.0.0.123 dev eth1 table local proto kernel scope host src 100.0.0.123
broadcast 100.0.0.127 dev eth1 table local proto kernel scope link src 100.0.0.123
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
local 172.17.0.7 dev eth0 table local proto kernel scope host src 172.17.0.7
broadcast 172.17.255.255 dev eth0 table local proto kernel scope link src 172.17.0.7
2023-10-01 12:30:32,189 DEBG 'start-script' stdout output:
--------------------
2023-10-01 12:30:32,193 DEBG 'start-script' stdout output:
iptable_mangle 16384 1
ip_tables 32768 5 iptable_filter,iptable_raw,iptable_mangle
x_tables 53248 13 xt_conntrack,iptable_filter,nft_compat,xt_tcpudp,xt_addrtype,xt_nat,xt_comment,xt_connmark,iptable_raw,ip_tables,xt_MASQUERADE,iptable_mangle,xt_mark
2023-10-01 12:30:32,193 DEBG 'start-script' stdout output:
[info] iptable_mangle support detected, adding fwmark for tables
2023-10-01 12:30:32,196 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists
2023-10-01 12:30:32,197 DEBG 'start-script' stderr output:
RTNETLINK answers: File exists
2023-10-01 12:30:32,277 DEBG 'start-script' stdout output:
[info] iptables defined as follows...
--------------------
2023-10-01 12:30:32,278 DEBG 'start-script' stdout output:
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT DROP
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8090 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8090 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i wg0 -j ACCEPT
-A INPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A INPUT -s 195.78.54.249/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.180/32 -i eth0 -j ACCEPT
-A INPUT -s 143.244.41.168/32 -i eth0 -j ACCEPT
-A INPUT -s 172.64.151.73/32 -i eth0 -j ACCEPT
-A INPUT -s 104.18.36.183/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.113.56/32 -i eth0 -j ACCEPT
-A INPUT -s 104.16.114.56/32 -i eth0 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8080 -j ACCEPT
-A INPUT -i eth0 -p tcp -m tcp --dport 8090 -j ACCEPT
-A INPUT -i eth0 -p udp -m udp --dport 8090 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i wg0 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8090 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8090 -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o wg0 -j ACCEPT
-A OUTPUT -s 172.17.0.0/16 -d 172.17.0.0/16 -j ACCEPT
-A OUTPUT -d 195.78.54.249/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.180/32 -o eth0 -j ACCEPT
-A OUTPUT -d 143.244.41.168/32 -o eth0 -j ACCEPT
-A OUTPUT -d 172.64.151.73/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.18.36.183/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.113.56/32 -o eth0 -j ACCEPT
-A OUTPUT -d 104.16.114.56/32 -o eth0 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8080 -j ACCEPT
-A OUTPUT -o eth0 -p tcp -m tcp --sport 8090 -j ACCEPT
-A OUTPUT -o eth0 -p udp -m udp --sport 8090 -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -o wg0 -j ACCEPT
2023-10-01 12:30:32,283 DEBG 'start-script' stdout output:
--------------------
2023-10-01 12:30:32,283 DEBG 'start-script' stdout output:
[info] Attempting to bring WireGuard interface 'up'...
2023-10-01 12:30:32,290 DEBG 'start-script' stderr output:
Warning: `/config/wireguard/wg0.conf' is world accessible
2023-10-01 12:30:32,295 DEBG 'start-script' stderr output:
[#] ip link add wg0 type wireguard
2023-10-01 12:30:32,297 DEBG 'start-script' stderr output:
[#] wg setconf wg0 /dev/fd/63
2023-10-01 12:30:32,299 DEBG 'start-script' stderr output:
[#] ip -4 address add 10.39.184.90 dev wg0
2023-10-01 12:30:32,303 DEBG 'start-script' stderr output:
[#] ip link set mtu 1420 up dev wg0
2023-10-01 12:30:32,310 DEBG 'start-script' stderr output:
[#] wg set wg0 fwmark 51820
2023-10-01 12:30:32,311 DEBG 'start-script' stderr output:
[#] ip -4 route add 0.0.0.0/0 dev wg0 table 51820
2023-10-01 12:30:32,312 DEBG 'start-script' stderr output:
[#] ip -4 rule add not fwmark 51820 table 51820
2023-10-01 12:30:32,313 DEBG 'start-script' stderr output:
[#] ip -4 rule add table main suppress_prefixlength 0
2023-10-01 12:30:32,316 DEBG 'start-script' stderr output:
[#] sysctl -q net.ipv4.conf.all.src_valid_mark=1
2023-10-01 12:30:32,317 DEBG 'start-script' stderr output:
[#] iptables-restore -n
2023-10-01 12:30:32,318 DEBG 'start-script' stderr output:
[#] '/root/wireguardup.sh'
2023-10-01 12:30:33,390 DEBG 'start-script' stdout output:
[info] Application does not require external IP address, skipping external IP address detection
2023-10-01 12:30:33,393 DEBG 'start-script' stdout output:
[info] WireGuard interface 'up'
2023-10-01 12:30:33,396 DEBG 'start-script' stdout output:
[info] Application does not require port forwarding, skipping incoming port assignment
2023-10-01 12:30:33,441 DEBG 'watchdog-script' stdout output:
[info] SABnzbd not running
2023-10-01 12:30:33,441 DEBG 'watchdog-script' stdout output:
[info] Attempting to start SABnzbd...
2023-10-01 12:30:34,058 DEBG 'watchdog-script' stdout output:
[info] SABnzbd process started
[info] Waiting for SABnzbd process to start listening on port 8080...
2023-10-01 12:30:34,179 DEBG 'watchdog-script' stdout output:
[info] SABnzbd process is listening on port 8080