Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug: Gluetun stops working after local network restarts #2693

Open
Celibistrial opened this issue Feb 7, 2025 · 1 comment
Open

Bug: Gluetun stops working after local network restarts #2693

Celibistrial opened this issue Feb 7, 2025 · 1 comment

Comments

@Celibistrial
Copy link

Is this urgent?

Yes

Host OS

Debian Bookworm

CPU arch

x86_64

VPN service provider

Mullvad

What are you using to run the container

docker-compose

What is the version of Gluetun

Running version v3.40.0 built on 2024-12-25T22:01:25.675Z (commit e890c50)

What's the problem 🤔

My router turns off at night and starts again in the morning. During this time internet connectivity is lost and gluetun seems to die.
However even after restarting gluetun , i cannot access qbittorrent / prowlarr which are using gluetun as their network. The proxy works however.

Share your logs (at least 10 lines)

========================================
========================================
=============== gluetun ================
========================================
=========== Made with ❤️ by ============
======= https://github.com/qdm12 =======
========================================
========================================

Running version v3.40.0 built on 2024-12-25T22:01:25.675Z (commit e890c50)

🔧 Need help? ☕ Discussion? https://github.com/qdm12/gluetun/discussions/new/choose
🐛 Bug? ✨ New feature? https://github.com/qdm12/gluetun/issues/new/choose
💻 Email? [email protected]
💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12
2025-02-07T04:26:40Z INFO [routing] default route found: interface eth0, gateway 172.27.0.1, assigned IP 172.27.0.10 and family v4
2025-02-07T04:26:40Z INFO [routing] local ethernet link found: eth0
2025-02-07T04:26:40Z INFO [routing] local ipnet found: 172.27.0.0/16
2025-02-07T04:26:40Z INFO [firewall] enabling...
2025-02-07T04:26:40Z INFO [firewall] enabled successfully
2025-02-07T04:26:40Z INFO [storage] creating /gluetun/servers.json with 20776 hardcoded servers
2025-02-07T04:26:41Z INFO Alpine version: 3.20.3
2025-02-07T04:26:41Z INFO OpenVPN 2.5 version: 2.5.10
2025-02-07T04:26:41Z INFO OpenVPN 2.6 version: 2.6.11
2025-02-07T04:26:41Z INFO IPtables version: v1.8.10
2025-02-07T04:26:41Z INFO Settings summary:
├── VPN settings:
|   ├── VPN provider settings:
|   |   ├── Name: custom
|   |   └── Server selection settings:
|   |       ├── VPN type: wireguard
|   |       └── Wireguard selection settings:
|   |           ├── Endpoint IP address: 138.199.60.2
|   |           ├── Endpoint port: 51820
|   |           └── Server public key: sFHv/qzG7b6ds5pow+oAR3G5Wqp9eFbBD3BmEGBuUWU=
|   └── Wireguard settings:
|       ├── Private key: QHm...HU=
|       ├── Interface addresses:
|       |   └── 10.74.66.103/32
|       ├── Allowed IPs:
|       |   ├── 0.0.0.0/0
|       |   └── ::/0
|       └── Network interface: tun0
|           └── MTU: 1320
├── DNS settings:
|   ├── Keep existing nameserver(s): no
|   ├── DNS server address to use: 127.0.0.1
|   └── DNS over TLS settings:
|       ├── Enabled: yes
|       ├── Update period: every 24h0m0s
|       ├── Upstream resolvers:
|       |   └── cloudflare
|       ├── Caching: yes
|       ├── IPv6: no
|       └── DNS filtering settings:
|           ├── Block malicious: yes
|           ├── Block ads: no
|           ├── Block surveillance: no
|           └── Blocked IP networks:
|               ├── 127.0.0.1/8
|               ├── 10.0.0.0/8
|               ├── 172.16.0.0/12
|               ├── 192.168.0.0/16
|               ├── 169.254.0.0/16
|               ├── ::1/128
|               ├── fc00::/7
|               ├── fe80::/10
|               ├── ::ffff:127.0.0.1/104
|               ├── ::ffff:10.0.0.0/104
|               ├── ::ffff:169.254.0.0/112
|               ├── ::ffff:172.16.0.0/108
|               └── ::ffff:192.168.0.0/112
├── Firewall settings:
|   └── Enabled: yes
├── Log settings:
|   └── Log level: info
├── Health settings:
|   ├── Server listening address: 127.0.0.1:9999
|   ├── Target address: cloudflare.com:443
|   ├── Duration to wait after success: 5s
|   ├── Read header timeout: 100ms
|   ├── Read timeout: 500ms
|   └── VPN wait durations:
|       ├── Initial duration: 6s
|       └── Additional duration: 5s
├── Shadowsocks server settings:
|   └── Enabled: no
├── HTTP proxy settings:
|   ├── Enabled: yes
|   ├── Listening address: :8888
|   ├── User: 
|   ├── Password: [not set]
|   ├── Stealth mode: yes
|   ├── Log: no
|   ├── Read header timeout: 1s
|   └── Read timeout: 3s
├── Control server settings:
|   ├── Listening address: :8000
|   ├── Logging: yes
|   └── Authentication file path: /gluetun/auth/config.toml
├── Storage settings:
|   └── Filepath: /gluetun/servers.json
├── OS Alpine settings:
|   ├── Process UID: 1000
|   └── Process GID: 1000
├── Public IP settings:
|   ├── IP file path: /tmp/gluetun/ip
|   ├── Public IP data base API: ipinfo
|   └── Public IP data backup APIs:
|       ├── ifconfigco
|       ├── ip2location
|       └── cloudflare
└── Version settings:
    └── Enabled: yes
2025-02-07T04:26:42Z INFO [routing] default route found: interface eth0, gateway 172.27.0.1, assigned IP 172.27.0.10 and family v4
2025-02-07T04:26:42Z INFO [routing] adding route for 0.0.0.0/0
2025-02-07T04:26:42Z INFO [firewall] setting allowed subnets...
2025-02-07T04:26:42Z INFO [routing] default route found: interface eth0, gateway 172.27.0.1, assigned IP 172.27.0.10 and family v4
2025-02-07T04:26:42Z INFO [dns] using plaintext DNS at address 1.1.1.1
2025-02-07T04:26:42Z INFO [http proxy] listening on :8888
2025-02-07T04:26:42Z INFO [http server] http server listening on [::]:8000
2025-02-07T04:26:42Z INFO [firewall] allowing VPN connection...
2025-02-07T04:26:42Z INFO [healthcheck] listening on 127.0.0.1:9999
2025-02-07T04:26:42Z INFO [wireguard] Using available kernelspace implementation
2025-02-07T04:26:42Z INFO [wireguard] Connecting to 138.199.60.2:51820
2025-02-07T04:26:42Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2025-02-07T04:26:42Z INFO [dns] downloading hostnames and IP block lists
2025-02-07T04:26:52Z INFO [healthcheck] program has been unhealthy for 6s: restarting VPN (healthcheck error: dialing: dial tcp4: lookup cloudflare.com: i/o timeout)
2025-02-07T04:26:52Z INFO [healthcheck] 👉 See https://github.com/qdm12/gluetun-wiki/blob/main/faq/healthcheck.md
2025-02-07T04:26:52Z INFO [healthcheck] DO NOT OPEN AN ISSUE UNLESS YOU READ AND TRIED EACH POSSIBLE SOLUTION
2025-02-07T04:26:52Z INFO [vpn] stopping
2025-02-07T04:26:52Z ERROR [vpn] getting public IP address information: fetching information: Get "https://ipinfo.io/": context canceled
2025-02-07T04:26:52Z ERROR [vpn] cannot get version information: Get "https://api.github.com/repos/qdm12/gluetun/releases": context canceled
2025-02-07T04:26:52Z WARN [dns] cannot update filter block lists: Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-hostnames.updated": dial tcp: lookup raw.githubusercontent.com on 1.1.1.1:53: read udp 10.74.66.103:50997->1.1.1.1:53: i/o timeout, Get "https://raw.githubusercontent.com/qdm12/files/master/malicious-ips.updated": dial tcp: lookup raw.githubusercontent.com on 1.1.1.1:53: read udp 10.74.66.103:50997->1.1.1.1:53: i/o timeout
2025-02-07T04:26:52Z INFO [dns] attempting restart in 10s
2025-02-07T04:26:52Z INFO [vpn] starting
2025-02-07T04:26:52Z INFO [firewall] allowing VPN connection...
2025-02-07T04:26:52Z INFO [wireguard] Using available kernelspace implementation
2025-02-07T04:26:52Z INFO [wireguard] Connecting to 138.199.60.2:51820
2025-02-07T04:26:52Z INFO [wireguard] Wireguard setup is complete. Note Wireguard is a silent protocol and it may or may not work, without giving any error message. Typically i/o timeout errors indicate the Wireguard connection is not working.
2025-02-07T04:26:53Z INFO [healthcheck] healthy!
2025-02-07T04:26:53Z INFO [ip getter] Public IP address is 138.199.60.13 (Singapore, Singapore, Singapore - source: ipinfo)
2025-02-07T04:27:02Z INFO [dns] downloading hostnames and IP block lists
2025-02-07T04:27:04Z INFO [dns] DNS server listening on [::]:53
2025-02-07T04:27:04Z INFO [dns] ready
2025-02-07T04:27:21Z INFO [healthcheck] healthy!

Share your configuration

services:
  gluetun:
    image: qmcgaw/gluetun:v3
    container_name: gluetun
    cap_add:
      - NET_ADMIN
    devices:
      - /dev/net/tun:/dev/net/tun
    ports:
      - 8888:8888/tcp   # HTTP proxy
      - 8388:8388/tcp   # Shadowsocks
      - 8388:8388/udp   # Shadowsocks
      - 9696:9696/tcp   # Add this line for Prowlarr
      - 8080:8080       # qbittorrent
    volumes:
      - ./gluetun:/config
      - /etc/wireguard/sg-sin-wg.conf:/gluetun/wireguard/wg0.conf
prowlarr:
    image: lscr.io/linuxserver/prowlarr:latest
    container_name: prowlarr
    environment:
      - PUID=${USER_ID}
      - PGID=${GROUP_ID}
      - TZ=${TIMEZONE}
    volumes:
      - ./prowlarr:/config
    restart: always
    network_mode: "service:gluetun"
    depends_on:
      - gluetun
Copy link
Contributor

github-actions bot commented Feb 7, 2025

@qdm12 is more or less the only maintainer of this project and works on it in his free time.
Please:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant