[SUPPORT] DiamondPrecisionComputing - ALL IMAGES AND FILES


Recommended Posts

I have been using City: Vancouver for months, but when I noticed the container wouldn't start today, I tried changing to different cities and had no luck.  Then I changed to region "Canada East" just in case some particular servers were down but still get no love.

 

This is what I receive when I reverted to v3.31.1.

 

root@Goliath:~# ls /var/lib/docker/containers/1fb*
1fb0f37c9dabf579f6fbcb7b06895180442630739c3a5a6413386c9321857e6c-json.log  hostconfig.json  mounts/
checkpoints/                                                               hostname         resolv.conf
config.v2.json                                                             hosts            resolv.conf.hash
root@Goliath:~# cat /var/lib/docker/containers/1fb*/*.log
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:18:02.574579426Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:18:02.574646045Z"}
{"log":"=============== gluetun ================\n","stream":"stdout","time":"2022-09-17T19:18:02.574665227Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:18:02.574673747Z"}
{"log":"=========== Made with ❤️ by ============\n","stream":"stdout","time":"2022-09-17T19:18:02.574681335Z"}
{"log":"======= https://github.com/qdm12 =======\n","stream":"stdout","time":"2022-09-17T19:18:02.574689313Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:18:02.574696558Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:18:02.574703597Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:18:02.574710855Z"}
{"log":"Running version v3.31.1 built on 2022-09-11T20:25:49.370Z (commit 8f04a05)\n","stream":"stdout","time":"2022-09-17T19:18:02.574718167Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:18:02.574738832Z"}
{"log":"🔧 Need help? https://github.com/qdm12/gluetun/discussions/new\n","stream":"stdout","time":"2022-09-17T19:18:02.574745972Z"}
{"log":"🐛 Bug? https://github.com/qdm12/gluetun/issues/new\n","stream":"stdout","time":"2022-09-17T19:18:02.574753417Z"}
{"log":" New feature? https://github.com/qdm12/gluetun/issues/new\n","stream":"stdout","time":"2022-09-17T19:18:02.574760566Z"}
{"log":" Discussion? https://github.com/qdm12/gluetun/discussions/new\n","stream":"stdout","time":"2022-09-17T19:18:02.574767806Z"}
{"log":"💻 Email? [email protected]\n","stream":"stdout","time":"2022-09-17T19:18:02.574775002Z"}
{"log":"💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12\n","stream":"stdout","time":"2022-09-17T19:18:02.574782294Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable VPNSP, please consider changing it to VPN_SERVICE_PROVIDER\n","stream":"stdout","time":"2022-09-17T19:18:02.575053514Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable REGION, please consider changing it to SERVER_REGIONS\n","stream":"stdout","time":"2022-09-17T19:18:02.575080747Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable WIREGUARD_ENDPOINT_PORT, please consider changing it to VPN_ENDPOINT_PORT\n","stream":"stdout","time":"2022-09-17T19:18:02.575092111Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable OPENVPN_INTERFACE, please consider changing it to VPN_INTERFACE\n","stream":"stdout","time":"2022-09-17T19:18:02.575101289Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable OPENVPN_ROOT, please consider changing it to OPENVPN_PROCESS_USER\n","stream":"stdout","time":"2022-09-17T19:18:02.575109171Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable WIREGUARD_INTERFACE, please consider changing it to VPN_INTERFACE\n","stream":"stdout","time":"2022-09-17T19:18:02.575118261Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable WIREGUARD_ADDRESS, please consider changing it to WIREGUARD_ADDRESSES\n","stream":"stdout","time":"2022-09-17T19:18:02.575125939Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable HEALTH_ADDRESS_TO_PING, please consider changing it to HEALTH_TARGET_ADDRESS\n","stream":"stdout","time":"2022-09-17T19:18:02.575164211Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN You are using the old environment variable DNS_PLAINTEXT_ADDRESS, please consider changing it to DNS_ADDRESS\n","stream":"stdout","time":"2022-09-17T19:18:02.575202536Z"}
{"log":"2022-09-17T11:18:02-08:00 WARN DNS_PLAINTEXT_ADDRESS is set to 10.255.255.2 so the DNS over TLS (DoT) server will not be used. The default value changed to 127.0.0.1 so it uses the internal DoT server. If the DoT server fails to start, the IPv4 address of the first plaintext DNS server corresponding to the first DoT provider chosen is used.\n","stream":"stdout","time":"2022-09-17T19:18:02.575214225Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:18:02.576708396Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:18:02.577100924Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [routing] local ethernet link found: gretap0\n","stream":"stdout","time":"2022-09-17T19:18:02.57735156Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [routing] local ethernet link found: erspan0\n","stream":"stdout","time":"2022-09-17T19:18:02.5773644Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [routing] local ethernet link found: eth0\n","stream":"stdout","time":"2022-09-17T19:18:02.577372313Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [routing] local ipnet found: 172.17.0.0/16\n","stream":"stdout","time":"2022-09-17T19:18:02.577641979Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [firewall] enabling...\n","stream":"stdout","time":"2022-09-17T19:18:02.595588978Z"}
{"log":"2022-09-17T11:18:02-08:00 INFO [firewall] enabled successfully\n","stream":"stdout","time":"2022-09-17T19:18:02.630402506Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] merging by most recent 11434 hardcoded servers and 11711 servers read from /gluetun/servers.json\n","stream":"stdout","time":"2022-09-17T19:18:03.144713445Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] Using cyberghost servers from file which are 349 days more recent\n","stream":"stdout","time":"2022-09-17T19:18:03.144755172Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] Using ivpn servers from file which are 374 days more recent\n","stream":"stdout","time":"2022-09-17T19:18:03.148907051Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] Using mullvad servers from file which are 124 days more recent\n","stream":"stdout","time":"2022-09-17T19:18:03.14894017Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] Using protonvpn servers from file which are 72 days more recent\n","stream":"stdout","time":"2022-09-17T19:18:03.16018782Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] Using surfshark servers from file which are 24 hours more recent\n","stream":"stdout","time":"2022-09-17T19:18:03.160500133Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [storage] Using windscribe servers from file which are 141 days more recent\n","stream":"stdout","time":"2022-09-17T19:18:03.160996932Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO Alpine version: 3.16.2\n","stream":"stdout","time":"2022-09-17T19:18:03.274043363Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO OpenVPN 2.4 version: 2.4.12\n","stream":"stdout","time":"2022-09-17T19:18:03.29386459Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO OpenVPN 2.5 version: 2.5.6\n","stream":"stdout","time":"2022-09-17T19:18:03.301992484Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO Unbound version: 1.15.0\n","stream":"stdout","time":"2022-09-17T19:18:03.308875727Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO IPtables version: v1.8.8\n","stream":"stdout","time":"2022-09-17T19:18:03.310354457Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO Settings summary:\n","stream":"stdout","time":"2022-09-17T19:18:03.310743658Z"}
{"log":"├── VPN settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310767878Z"}
{"log":"|   ├── VPN provider settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310777884Z"}
{"log":"|   |   ├── Name: windscribe\n","stream":"stdout","time":"2022-09-17T19:18:03.310786064Z"}
{"log":"|   |   └── Server selection settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310794081Z"}
{"log":"|   |       ├── VPN type: wireguard\n","stream":"stdout","time":"2022-09-17T19:18:03.310802173Z"}
{"log":"|   |       ├── Regions: canada east\n","stream":"stdout","time":"2022-09-17T19:18:03.31081057Z"}
{"log":"|   |       └── Wireguard selection settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310827684Z"}
{"log":"|   |           ├── Endpoint port: 443\n","stream":"stdout","time":"2022-09-17T19:18:03.310866084Z"}
{"log":"|   |           └── Server public key: YxWQDjNmU41PJXtoobFek3Y6nhICSLgsqH+QKPO5AQ8=\n","stream":"stdout","time":"2022-09-17T19:18:03.310876343Z"}
{"log":"|   └── Wireguard settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310884766Z"}
{"log":"|       ├── Private key: CI...nM=\n","stream":"stdout","time":"2022-09-17T19:18:03.310892529Z"}
{"log":"|       ├── Pre-shared key: tl...lo=\n","stream":"stdout","time":"2022-09-17T19:18:03.310900437Z"}
{"log":"|       ├── Interface addresses:\n","stream":"stdout","time":"2022-09-17T19:18:03.310908383Z"}
{"log":"|       |   └── 100.111.141.127/32\n","stream":"stdout","time":"2022-09-17T19:18:03.310916145Z"}
{"log":"|       └── Network interface: wg10\n","stream":"stdout","time":"2022-09-17T19:18:03.310923917Z"}
{"log":"├── DNS settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310931896Z"}
{"log":"|   ├── DNS server address to use: 10.255.255.2\n","stream":"stdout","time":"2022-09-17T19:18:03.31093964Z"}
{"log":"|   ├── Keep existing nameserver(s): no\n","stream":"stdout","time":"2022-09-17T19:18:03.3109476Z"}
{"log":"|   └── DNS over TLS settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.31095548Z"}
{"log":"|       ├── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.310963366Z"}
{"log":"|       ├── Update period: every 24h0m0s\n","stream":"stdout","time":"2022-09-17T19:18:03.310971182Z"}
{"log":"|       ├── Unbound settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.310979194Z"}
{"log":"|       |   ├── Authoritative servers:\n","stream":"stdout","time":"2022-09-17T19:18:03.310986928Z"}
{"log":"|       |   |   └── cloudflare\n","stream":"stdout","time":"2022-09-17T19:18:03.310995011Z"}
{"log":"|       |   ├── Caching: no\n","stream":"stdout","time":"2022-09-17T19:18:03.311002722Z"}
{"log":"|       |   ├── IPv6: no\n","stream":"stdout","time":"2022-09-17T19:18:03.311010496Z"}
{"log":"|       |   ├── Verbosity level: 1\n","stream":"stdout","time":"2022-09-17T19:18:03.311018236Z"}
{"log":"|       |   ├── Verbosity details level: 0\n","stream":"stdout","time":"2022-09-17T19:18:03.311026568Z"}
{"log":"|       |   ├── Validation log level: 0\n","stream":"stdout","time":"2022-09-17T19:18:03.311034522Z"}
{"log":"|       |   ├── System user: root\n","stream":"stdout","time":"2022-09-17T19:18:03.311042359Z"}
{"log":"|       |   └── Allowed networks:\n","stream":"stdout","time":"2022-09-17T19:18:03.311050036Z"}
{"log":"|       |       ├── 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:18:03.311057842Z"}
{"log":"|       |       └── ::/0\n","stream":"stdout","time":"2022-09-17T19:18:03.311065728Z"}
{"log":"|       └── DNS filtering settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311073439Z"}
{"log":"|           ├── Block malicious: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.311082045Z"}
{"log":"|           ├── Block ads: no\n","stream":"stdout","time":"2022-09-17T19:18:03.311089845Z"}
{"log":"|           ├── Block surveillance: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.311097538Z"}
{"log":"|           └── Blocked IP networks:\n","stream":"stdout","time":"2022-09-17T19:18:03.31110527Z"}
{"log":"|               ├── 127.0.0.1/8\n","stream":"stdout","time":"2022-09-17T19:18:03.311112964Z"}
{"log":"|               ├── 10.0.0.0/8\n","stream":"stdout","time":"2022-09-17T19:18:03.31112067Z"}
{"log":"|               ├── 172.16.0.0/12\n","stream":"stdout","time":"2022-09-17T19:18:03.311128421Z"}
{"log":"|               ├── 192.168.0.0/16\n","stream":"stdout","time":"2022-09-17T19:18:03.311136164Z"}
{"log":"|               ├── 169.254.0.0/16\n","stream":"stdout","time":"2022-09-17T19:18:03.311143975Z"}
{"log":"|               ├── ::1/128\n","stream":"stdout","time":"2022-09-17T19:18:03.311151672Z"}
{"log":"|               ├── fc00::/7\n","stream":"stdout","time":"2022-09-17T19:18:03.31117017Z"}
{"log":"|               ├── fe80::/10\n","stream":"stdout","time":"2022-09-17T19:18:03.311178774Z"}
{"log":"|               ├── ::ffff:7f00:1/104\n","stream":"stdout","time":"2022-09-17T19:18:03.311186515Z"}
{"log":"|               ├── ::ffff:a00:0/104\n","stream":"stdout","time":"2022-09-17T19:18:03.311194306Z"}
{"log":"|               ├── ::ffff:a9fe:0/112\n","stream":"stdout","time":"2022-09-17T19:18:03.311203269Z"}
{"log":"|               ├── ::ffff:ac10:0/108\n","stream":"stdout","time":"2022-09-17T19:18:03.311211183Z"}
{"log":"|               └── ::ffff:c0a8:0/112\n","stream":"stdout","time":"2022-09-17T19:18:03.311218952Z"}
{"log":"├── Firewall settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311226706Z"}
{"log":"|   └── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.31123448Z"}
{"log":"├── Log settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.31124226Z"}
{"log":"|   └── Log level: INFO\n","stream":"stdout","time":"2022-09-17T19:18:03.311249974Z"}
{"log":"├── Health settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311257717Z"}
{"log":"|   ├── Server listening address: 127.0.0.1:9999\n","stream":"stdout","time":"2022-09-17T19:18:03.311265517Z"}
{"log":"|   ├── Target address: github.com\n","stream":"stdout","time":"2022-09-17T19:18:03.311273406Z"}
{"log":"|   ├── Read header timeout: 100ms\n","stream":"stdout","time":"2022-09-17T19:18:03.311281182Z"}
{"log":"|   ├── Read timeout: 500ms\n","stream":"stdout","time":"2022-09-17T19:18:03.311288917Z"}
{"log":"|   └── VPN wait durations:\n","stream":"stdout","time":"2022-09-17T19:18:03.311296717Z"}
{"log":"|       ├── Initial duration: 10s\n","stream":"stdout","time":"2022-09-17T19:18:03.311304419Z"}
{"log":"|       └── Additional duration: 10s\n","stream":"stdout","time":"2022-09-17T19:18:03.31131224Z"}
{"log":"├── Shadowsocks server settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.31132004Z"}
{"log":"|   ├── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.311327957Z"}
{"log":"|   ├── Listening address: :8388\n","stream":"stdout","time":"2022-09-17T19:18:03.311335662Z"}
{"log":"|   ├── Cipher: chacha20-ietf-poly1305\n","stream":"stdout","time":"2022-09-17T19:18:03.311343379Z"}
{"log":"|   ├── Password: [set]\n","stream":"stdout","time":"2022-09-17T19:18:03.311351156Z"}
{"log":"|   └── Log addresses: no\n","stream":"stdout","time":"2022-09-17T19:18:03.311358953Z"}
{"log":"├── HTTP proxy settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311366728Z"}
{"log":"|   └── Enabled: no\n","stream":"stdout","time":"2022-09-17T19:18:03.311374587Z"}
{"log":"├── Control server settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311382279Z"}
{"log":"|   ├── Listening address: :8000\n","stream":"stdout","time":"2022-09-17T19:18:03.31139011Z"}
{"log":"|   └── Logging: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.311397973Z"}
{"log":"├── OS Alpine settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311405645Z"}
{"log":"|   ├── Process UID: 1000\n","stream":"stdout","time":"2022-09-17T19:18:03.311413399Z"}
{"log":"|   ├── Process GID: 1000\n","stream":"stdout","time":"2022-09-17T19:18:03.311421052Z"}
{"log":"|   └── Timezone: America/Anchorage\n","stream":"stdout","time":"2022-09-17T19:18:03.311428815Z"}
{"log":"├── Public IP settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311436553Z"}
{"log":"|   ├── Fetching: every 12h0m0s\n","stream":"stdout","time":"2022-09-17T19:18:03.311444344Z"}
{"log":"|   └── IP file path: /gluetun/ip\n","stream":"stdout","time":"2022-09-17T19:18:03.311452119Z"}
{"log":"├── Server data updater settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311459821Z"}
{"log":"|   ├── Update period: 12h0m0s\n","stream":"stdout","time":"2022-09-17T19:18:03.311467547Z"}
{"log":"|   ├── DNS address: 1.1.1.1:53\n","stream":"stdout","time":"2022-09-17T19:18:03.311484198Z"}
{"log":"|   ├── Minimum ratio: 0.8\n","stream":"stdout","time":"2022-09-17T19:18:03.311492575Z"}
{"log":"|   └── Providers to update: windscribe\n","stream":"stdout","time":"2022-09-17T19:18:03.311500583Z"}
{"log":"└── Version settings:\n","stream":"stdout","time":"2022-09-17T19:18:03.311508463Z"}
{"log":"    └── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:18:03.311516324Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:18:03.312111232Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:18:03.312535755Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [routing] adding route for 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:18:03.312768723Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [routing] adding route for ::/0\n","stream":"stdout","time":"2022-09-17T19:18:03.312926855Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [firewall] setting allowed subnets...\n","stream":"stdout","time":"2022-09-17T19:18:03.313077398Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:18:03.313476276Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:18:03.313830061Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...\n","stream":"stdout","time":"2022-09-17T19:18:03.313850518Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [pprof] http server listening on [::]:6060\n","stream":"stdout","time":"2022-09-17T19:18:03.314291951Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [dns over tls] using plaintext DNS at address 10.255.255.2\n","stream":"stdout","time":"2022-09-17T19:18:03.314466736Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [http server] http server listening on [::]:8000\n","stream":"stdout","time":"2022-09-17T19:18:03.314560912Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [healthcheck] listening on 127.0.0.1:9999\n","stream":"stdout","time":"2022-09-17T19:18:03.314677897Z"}
{"log":"2022-09-17T11:18:03-08:00 ERROR [vpn] failed finding a VPN server: cannot filter servers: no server found: for VPN wireguard; protocol udp; region canada east\n","stream":"stdout","time":"2022-09-17T19:18:03.314736326Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [vpn] retrying in 15s\n","stream":"stdout","time":"2022-09-17T19:18:03.314749557Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [shadowsocks] listening TCP on :8388\n","stream":"stdout","time":"2022-09-17T19:18:03.316529295Z"}
{"log":"2022-09-17T11:18:03-08:00 INFO [shadowsocks] listening UDP on :8388\n","stream":"stdout","time":"2022-09-17T19:18:03.316553396Z"}
{"log":"2022-09-17T11:18:13-08:00 INFO [healthcheck] program has been unhealthy for 10s: restarting VPN\n","stream":"stdout","time":"2022-09-17T19:18:13.315340829Z"}
{"log":"2022-09-17T11:18:18-08:00 ERROR [vpn] failed finding a VPN server: cannot filter servers: no server found: for VPN wireguard; protocol udp; region canada east\n","stream":"stdout","time":"2022-09-17T19:18:18.315321761Z"}
{"log":"2022-09-17T11:18:18-08:00 INFO [vpn] retrying in 30s\n","stream":"stdout","time":"2022-09-17T19:18:18.315389593Z"}
{"log":"2022-09-17T11:18:33-08:00 INFO [healthcheck] program has been unhealthy for 20s: restarting VPN\n","stream":"stdout","time":"2022-09-17T19:18:33.316177938Z"}
{"log":"2022-09-17T11:18:48-08:00 ERROR [vpn] failed finding a VPN server: cannot filter servers: no server found: for VPN wireguard; protocol udp; region canada east\n","stream":"stdout","time":"2022-09-17T19:18:48.316302025Z"}
{"log":"2022-09-17T11:18:48-08:00 INFO [vpn] retrying in 1m0s\n","stream":"stdout","time":"2022-09-17T19:18:48.316393939Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:19:00.456553077Z"}
{"log":"2022-09-17T11:19:00-08:00 WARN Caught OS signal terminated, shutting down\n","stream":"stdout","time":"2022-09-17T19:19:00.456617764Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO dns ticker: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.456680925Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO updater ticker: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.456719119Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO http server: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.457885386Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO control: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.457915996Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO updater: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.457928193Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO public IP: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.457937833Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO tickers: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.457945334Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO HTTP health server: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459196671Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO vpn: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459231298Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO port forwarding: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459241225Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO http proxy: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459333497Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO unbound: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459366882Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO public IP: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459377242Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO shadowsocks proxy: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.459397476Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO pprof server: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.460516529Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO other: terminated ✔️\n","stream":"stdout","time":"2022-09-17T19:19:00.460548784Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO [routing] routing cleanup...\n","stream":"stdout","time":"2022-09-17T19:19:00.460570833Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:00.461127545Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:00.461427316Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO [routing] deleting route for 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:19:00.461463295Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO [routing] deleting route for ::/0\n","stream":"stdout","time":"2022-09-17T19:19:00.461557078Z"}
{"log":"2022-09-17T11:19:00-08:00 INFO Shutdown successful\n","stream":"stdout","time":"2022-09-17T19:19:00.461859453Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:19:01.619176712Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:19:01.619216808Z"}
{"log":"=============== gluetun ================\n","stream":"stdout","time":"2022-09-17T19:19:01.619224896Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:19:01.619231338Z"}
{"log":"=========== Made with ❤️ by ============\n","stream":"stdout","time":"2022-09-17T19:19:01.619237614Z"}
{"log":"======= https://github.com/qdm12 =======\n","stream":"stdout","time":"2022-09-17T19:19:01.619247051Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:19:01.619253358Z"}
{"log":"========================================\n","stream":"stdout","time":"2022-09-17T19:19:01.619286753Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:19:01.619295001Z"}
{"log":"Running version v3.31.1 built on 2022-09-11T20:25:49.370Z (commit 8f04a05)\n","stream":"stdout","time":"2022-09-17T19:19:01.619301435Z"}
{"log":"\n","stream":"stdout","time":"2022-09-17T19:19:01.619308505Z"}
{"log":"🔧 Need help? https://github.com/qdm12/gluetun/discussions/new\n","stream":"stdout","time":"2022-09-17T19:19:01.619314958Z"}
{"log":"🐛 Bug? https://github.com/qdm12/gluetun/issues/new\n","stream":"stdout","time":"2022-09-17T19:19:01.619321485Z"}
{"log":" New feature? https://github.com/qdm12/gluetun/issues/new\n","stream":"stdout","time":"2022-09-17T19:19:01.619327738Z"}
{"log":" Discussion? https://github.com/qdm12/gluetun/discussions/new\n","stream":"stdout","time":"2022-09-17T19:19:01.61933419Z"}
{"log":"💻 Email? [email protected]\n","stream":"stdout","time":"2022-09-17T19:19:01.619340645Z"}
{"log":"💰 Help me? https://www.paypal.me/qmcgaw https://github.com/sponsors/qdm12\n","stream":"stdout","time":"2022-09-17T19:19:01.61934701Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable VPNSP, please consider changing it to VPN_SERVICE_PROVIDER\n","stream":"stdout","time":"2022-09-17T19:19:01.619363593Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable REGION, please consider changing it to SERVER_REGIONS\n","stream":"stdout","time":"2022-09-17T19:19:01.619370837Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable WIREGUARD_ENDPOINT_PORT, please consider changing it to VPN_ENDPOINT_PORT\n","stream":"stdout","time":"2022-09-17T19:19:01.619377932Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable OPENVPN_INTERFACE, please consider changing it to VPN_INTERFACE\n","stream":"stdout","time":"2022-09-17T19:19:01.61938679Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable OPENVPN_ROOT, please consider changing it to OPENVPN_PROCESS_USER\n","stream":"stdout","time":"2022-09-17T19:19:01.619393827Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable WIREGUARD_INTERFACE, please consider changing it to VPN_INTERFACE\n","stream":"stdout","time":"2022-09-17T19:19:01.619400537Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable WIREGUARD_ADDRESS, please consider changing it to WIREGUARD_ADDRESSES\n","stream":"stdout","time":"2022-09-17T19:19:01.61940705Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable HEALTH_ADDRESS_TO_PING, please consider changing it to HEALTH_TARGET_ADDRESS\n","stream":"stdout","time":"2022-09-17T19:19:01.61942379Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN You are using the old environment variable DNS_PLAINTEXT_ADDRESS, please consider changing it to DNS_ADDRESS\n","stream":"stdout","time":"2022-09-17T19:19:01.619470514Z"}
{"log":"2022-09-17T11:19:01-08:00 WARN DNS_PLAINTEXT_ADDRESS is set to 10.255.255.2 so the DNS over TLS (DoT) server will not be used. The default value changed to 127.0.0.1 so it uses the internal DoT server. If the DoT server fails to start, the IPv4 address of the first plaintext DNS server corresponding to the first DoT provider chosen is used.\n","stream":"stdout","time":"2022-09-17T19:19:01.619497294Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:01.62104393Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:01.621419308Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [routing] local ethernet link found: gretap0\n","stream":"stdout","time":"2022-09-17T19:19:01.621668873Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [routing] local ethernet link found: erspan0\n","stream":"stdout","time":"2022-09-17T19:19:01.621700232Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [routing] local ethernet link found: eth0\n","stream":"stdout","time":"2022-09-17T19:19:01.621750021Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [routing] local ipnet found: 172.17.0.0/16\n","stream":"stdout","time":"2022-09-17T19:19:01.621766575Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [firewall] enabling...\n","stream":"stdout","time":"2022-09-17T19:19:01.634630952Z"}
{"log":"2022-09-17T11:19:01-08:00 INFO [firewall] enabled successfully\n","stream":"stdout","time":"2022-09-17T19:19:01.658070928Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] merging by most recent 11434 hardcoded servers and 11711 servers read from /gluetun/servers.json\n","stream":"stdout","time":"2022-09-17T19:19:02.160977061Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] Using cyberghost servers from file which are 349 days more recent\n","stream":"stdout","time":"2022-09-17T19:19:02.161028354Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] Using ivpn servers from file which are 374 days more recent\n","stream":"stdout","time":"2022-09-17T19:19:02.168277002Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] Using mullvad servers from file which are 124 days more recent\n","stream":"stdout","time":"2022-09-17T19:19:02.168312547Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] Using protonvpn servers from file which are 72 days more recent\n","stream":"stdout","time":"2022-09-17T19:19:02.17771126Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] Using surfshark servers from file which are 24 hours more recent\n","stream":"stdout","time":"2022-09-17T19:19:02.17808998Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [storage] Using windscribe servers from file which are 141 days more recent\n","stream":"stdout","time":"2022-09-17T19:19:02.178446311Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO Alpine version: 3.16.2\n","stream":"stdout","time":"2022-09-17T19:19:02.303744626Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO OpenVPN 2.4 version: 2.4.12\n","stream":"stdout","time":"2022-09-17T19:19:02.306619426Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO OpenVPN 2.5 version: 2.5.6\n","stream":"stdout","time":"2022-09-17T19:19:02.311771546Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO Unbound version: 1.15.0\n","stream":"stdout","time":"2022-09-17T19:19:02.31439706Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO IPtables version: v1.8.8\n","stream":"stdout","time":"2022-09-17T19:19:02.31579303Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO Settings summary:\n","stream":"stdout","time":"2022-09-17T19:19:02.316038232Z"}
{"log":"├── VPN settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316065931Z"}
{"log":"|   ├── VPN provider settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316075768Z"}
{"log":"|   |   ├── Name: windscribe\n","stream":"stdout","time":"2022-09-17T19:19:02.316083269Z"}
{"log":"|   |   └── Server selection settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316090297Z"}
{"log":"|   |       ├── VPN type: wireguard\n","stream":"stdout","time":"2022-09-17T19:19:02.316098055Z"}
{"log":"|   |       ├── Regions: canada east\n","stream":"stdout","time":"2022-09-17T19:19:02.316105662Z"}
{"log":"|   |       └── Wireguard selection settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316112678Z"}
{"log":"|   |           ├── Endpoint port: 443\n","stream":"stdout","time":"2022-09-17T19:19:02.316119554Z"}
{"log":"|   |           └── Server public key: YxWQDjNmU41PJXtoobFek3Y6nhICSLgsqH+QKPO5AQ8=\n","stream":"stdout","time":"2022-09-17T19:19:02.316126426Z"}
{"log":"|   └── Wireguard settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316134208Z"}
{"log":"|       ├── Private key: CI...nM=\n","stream":"stdout","time":"2022-09-17T19:19:02.316141252Z"}
{"log":"|       ├── Pre-shared key: tl...lo=\n","stream":"stdout","time":"2022-09-17T19:19:02.316148713Z"}
{"log":"|       ├── Interface addresses:\n","stream":"stdout","time":"2022-09-17T19:19:02.316156142Z"}
{"log":"|       |   └── 100.111.141.127/32\n","stream":"stdout","time":"2022-09-17T19:19:02.316188219Z"}
{"log":"|       └── Network interface: wg10\n","stream":"stdout","time":"2022-09-17T19:19:02.31620826Z"}
{"log":"├── DNS settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316216491Z"}
{"log":"|   ├── DNS server address to use: 10.255.255.2\n","stream":"stdout","time":"2022-09-17T19:19:02.316224611Z"}
{"log":"|   ├── Keep existing nameserver(s): no\n","stream":"stdout","time":"2022-09-17T19:19:02.316232602Z"}
{"log":"|   └── DNS over TLS settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316240434Z"}
{"log":"|       ├── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316248265Z"}
{"log":"|       ├── Update period: every 24h0m0s\n","stream":"stdout","time":"2022-09-17T19:19:02.316256057Z"}
{"log":"|       ├── Unbound settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316263997Z"}
{"log":"|       |   ├── Authoritative servers:\n","stream":"stdout","time":"2022-09-17T19:19:02.316271748Z"}
{"log":"|       |   |   └── cloudflare\n","stream":"stdout","time":"2022-09-17T19:19:02.316279576Z"}
{"log":"|       |   ├── Caching: no\n","stream":"stdout","time":"2022-09-17T19:19:02.31628741Z"}
{"log":"|       |   ├── IPv6: no\n","stream":"stdout","time":"2022-09-17T19:19:02.316295539Z"}
{"log":"|       |   ├── Verbosity level: 1\n","stream":"stdout","time":"2022-09-17T19:19:02.316303308Z"}
{"log":"|       |   ├── Verbosity details level: 0\n","stream":"stdout","time":"2022-09-17T19:19:02.316311068Z"}
{"log":"|       |   ├── Validation log level: 0\n","stream":"stdout","time":"2022-09-17T19:19:02.316318884Z"}
{"log":"|       |   ├── System user: root\n","stream":"stdout","time":"2022-09-17T19:19:02.316326761Z"}
{"log":"|       |   └── Allowed networks:\n","stream":"stdout","time":"2022-09-17T19:19:02.316334551Z"}
{"log":"|       |       ├── 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:19:02.316342327Z"}
{"log":"|       |       └── ::/0\n","stream":"stdout","time":"2022-09-17T19:19:02.316350102Z"}
{"log":"|       └── DNS filtering settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316357982Z"}
{"log":"|           ├── Block malicious: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316365793Z"}
{"log":"|           ├── Block ads: no\n","stream":"stdout","time":"2022-09-17T19:19:02.316373673Z"}
{"log":"|           ├── Block surveillance: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316381404Z"}
{"log":"|           └── Blocked IP networks:\n","stream":"stdout","time":"2022-09-17T19:19:02.316389316Z"}
{"log":"|               ├── 127.0.0.1/8\n","stream":"stdout","time":"2022-09-17T19:19:02.316397055Z"}
{"log":"|               ├── 10.0.0.0/8\n","stream":"stdout","time":"2022-09-17T19:19:02.316404781Z"}
{"log":"|               ├── 172.16.0.0/12\n","stream":"stdout","time":"2022-09-17T19:19:02.316412547Z"}
{"log":"|               ├── 192.168.0.0/16\n","stream":"stdout","time":"2022-09-17T19:19:02.316420356Z"}
{"log":"|               ├── 169.254.0.0/16\n","stream":"stdout","time":"2022-09-17T19:19:02.316428083Z"}
{"log":"|               ├── ::1/128\n","stream":"stdout","time":"2022-09-17T19:19:02.316435796Z"}
{"log":"|               ├── fc00::/7\n","stream":"stdout","time":"2022-09-17T19:19:02.316443501Z"}
{"log":"|               ├── fe80::/10\n","stream":"stdout","time":"2022-09-17T19:19:02.31645156Z"}
{"log":"|               ├── ::ffff:7f00:1/104\n","stream":"stdout","time":"2022-09-17T19:19:02.31645931Z"}
{"log":"|               ├── ::ffff:a00:0/104\n","stream":"stdout","time":"2022-09-17T19:19:02.316467166Z"}
{"log":"|               ├── ::ffff:a9fe:0/112\n","stream":"stdout","time":"2022-09-17T19:19:02.316476309Z"}
{"log":"|               ├── ::ffff:ac10:0/108\n","stream":"stdout","time":"2022-09-17T19:19:02.316484258Z"}
{"log":"|               └── ::ffff:c0a8:0/112\n","stream":"stdout","time":"2022-09-17T19:19:02.316502012Z"}
{"log":"├── Firewall settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316510654Z"}
{"log":"|   └── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316518469Z"}
{"log":"├── Log settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316526605Z"}
{"log":"|   └── Log level: INFO\n","stream":"stdout","time":"2022-09-17T19:19:02.316534328Z"}
{"log":"├── Health settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316542125Z"}
{"log":"|   ├── Server listening address: 127.0.0.1:9999\n","stream":"stdout","time":"2022-09-17T19:19:02.316549897Z"}
{"log":"|   ├── Target address: github.com\n","stream":"stdout","time":"2022-09-17T19:19:02.316557832Z"}
{"log":"|   ├── Read header timeout: 100ms\n","stream":"stdout","time":"2022-09-17T19:19:02.316565629Z"}
{"log":"|   ├── Read timeout: 500ms\n","stream":"stdout","time":"2022-09-17T19:19:02.316573368Z"}
{"log":"|   └── VPN wait durations:\n","stream":"stdout","time":"2022-09-17T19:19:02.316581217Z"}
{"log":"|       ├── Initial duration: 10s\n","stream":"stdout","time":"2022-09-17T19:19:02.316588954Z"}
{"log":"|       └── Additional duration: 10s\n","stream":"stdout","time":"2022-09-17T19:19:02.316596951Z"}
{"log":"├── Shadowsocks server settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316604817Z"}
{"log":"|   ├── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316612656Z"}
{"log":"|   ├── Listening address: :8388\n","stream":"stdout","time":"2022-09-17T19:19:02.316620379Z"}
{"log":"|   ├── Cipher: chacha20-ietf-poly1305\n","stream":"stdout","time":"2022-09-17T19:19:02.316628168Z"}
{"log":"|   ├── Password: [set]\n","stream":"stdout","time":"2022-09-17T19:19:02.316636019Z"}
{"log":"|   └── Log addresses: no\n","stream":"stdout","time":"2022-09-17T19:19:02.316643776Z"}
{"log":"├── HTTP proxy settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316651558Z"}
{"log":"|   └── Enabled: no\n","stream":"stdout","time":"2022-09-17T19:19:02.316659333Z"}
{"log":"├── Control server settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316667038Z"}
{"log":"|   ├── Listening address: :8000\n","stream":"stdout","time":"2022-09-17T19:19:02.316674942Z"}
{"log":"|   └── Logging: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316682871Z"}
{"log":"├── OS Alpine settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316690591Z"}
{"log":"|   ├── Process UID: 1000\n","stream":"stdout","time":"2022-09-17T19:19:02.31669837Z"}
{"log":"|   ├── Process GID: 1000\n","stream":"stdout","time":"2022-09-17T19:19:02.316706147Z"}
{"log":"|   └── Timezone: America/Anchorage\n","stream":"stdout","time":"2022-09-17T19:19:02.316720413Z"}
{"log":"├── Public IP settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.31672823Z"}
{"log":"|   ├── Fetching: every 12h0m0s\n","stream":"stdout","time":"2022-09-17T19:19:02.31673625Z"}
{"log":"|   └── IP file path: /gluetun/ip\n","stream":"stdout","time":"2022-09-17T19:19:02.316744838Z"}
{"log":"├── Server data updater settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.316752913Z"}
{"log":"|   ├── Update period: 12h0m0s\n","stream":"stdout","time":"2022-09-17T19:19:02.316760841Z"}
{"log":"|   ├── DNS address: 1.1.1.1:53\n","stream":"stdout","time":"2022-09-17T19:19:02.31676879Z"}
{"log":"|   ├── Minimum ratio: 0.8\n","stream":"stdout","time":"2022-09-17T19:19:02.316776603Z"}
{"log":"|   └── Providers to update: windscribe\n","stream":"stdout","time":"2022-09-17T19:19:02.316784384Z"}
{"log":"└── Version settings:\n","stream":"stdout","time":"2022-09-17T19:19:02.31679224Z"}
{"log":"    └── Enabled: yes\n","stream":"stdout","time":"2022-09-17T19:19:02.316800067Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:02.316812432Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:02.317008356Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [routing] adding route for 0.0.0.0/0\n","stream":"stdout","time":"2022-09-17T19:19:02.31718578Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [routing] adding route for ::/0\n","stream":"stdout","time":"2022-09-17T19:19:02.317310998Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [firewall] setting allowed subnets...\n","stream":"stdout","time":"2022-09-17T19:19:02.317430375Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [routing] default route found: interface eth0, gateway 172.17.0.1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:02.317827294Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [routing] default route found: interface eth0, gateway fd17::1 and assigned IP 172.17.0.10\n","stream":"stdout","time":"2022-09-17T19:19:02.318110576Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO TUN device is not available: open /dev/net/tun: no such file or directory; creating it...\n","stream":"stdout","time":"2022-09-17T19:19:02.318126989Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [pprof] http server listening on [::]:6060\n","stream":"stdout","time":"2022-09-17T19:19:02.318488628Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [dns over tls] using plaintext DNS at address 10.255.255.2\n","stream":"stdout","time":"2022-09-17T19:19:02.318695716Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [http server] http server listening on [::]:8000\n","stream":"stdout","time":"2022-09-17T19:19:02.31874561Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [healthcheck] listening on 127.0.0.1:9999\n","stream":"stdout","time":"2022-09-17T19:19:02.318890147Z"}
{"log":"2022-09-17T11:19:02-08:00 ERROR [vpn] failed finding a VPN server: cannot filter servers: no server found: for VPN wireguard; protocol udp; region canada east\n","stream":"stdout","time":"2022-09-17T19:19:02.318992222Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [vpn] retrying in 15s\n","stream":"stdout","time":"2022-09-17T19:19:02.319012065Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [shadowsocks] listening TCP on :8388\n","stream":"stdout","time":"2022-09-17T19:19:02.323291009Z"}
{"log":"2022-09-17T11:19:02-08:00 INFO [shadowsocks] listening UDP on :8388\n","stream":"stdout","time":"2022-09-17T19:19:02.323326764Z"}
{"log":"2022-09-17T11:19:12-08:00 INFO [healthcheck] program has been unhealthy for 10s: restarting VPN\n","stream":"stdout","time":"2022-09-17T19:19:12.319104174Z"}
{"log":"2022-09-17T11:19:17-08:00 ERROR [vpn] failed finding a VPN server: cannot filter servers: no server found: for VPN wireguard; protocol udp; region canada east\n","stream":"stdout","time":"2022-09-17T19:19:17.320442124Z"}
{"log":"2022-09-17T11:19:17-08:00 INFO [vpn] retrying in 30s\n","stream":"stdout","time":"2022-09-17T19:19:17.320510053Z"}
{"log":"2022-09-17T11:19:32-08:00 INFO [healthcheck] program has been unhealthy for 20s: restarting VPN\n","stream":"stdout","time":"2022-09-17T19:19:32.319871321Z"}
{"log":"2022-09-17T11:19:47-08:00 ERROR [vpn] failed finding a VPN server: cannot filter servers: no server found: for VPN wireguard; protocol udp; region canada east\n","stream":"stdout","time":"2022-09-17T19:19:47.321297312Z"}
{"log":"2022-09-17T11:19:47-08:00 INFO [vpn] retrying in 1m0s\n","stream":"stdout","time":"2022-09-17T19:19:47.321368378Z"}
root@Goliath:~#

Link to comment
  • 1 month later...

I'm trying to run the ddns container, but I keep getting "ERROR unexpected end of JSON input"

 

This is my docker run from Unraid:

docker run
-d
--name='ddns-updater'
--net='bridge'
-e TZ="Europe/Paris"
-e HOST_OS="Unraid"
-e HOST_HOSTNAME="Unraid"
-e HOST_CONTAINERNAME="ddns-updater"
-e 'TZ'='Europe/Berlin'
-e 'PUBLICIP_FETCHERS'='all'
-e 'PUBLICIP_HTTP_PROVIDERS'='all'
-e 'PUBLICIPV4_HTTP_PROVIDERS'='all'
-e 'PUBLICIPV6_HTTP_PROVIDERS'='all'
-e 'PUBLICIP_DNS_PROVIDERS'='all'
-e 'PUBLICIP_DNS_TIMEOUT'='3s'
-e 'UPDATE_COOLDOWN_PERIOD'='5m'
-e 'HTTP_TIMEOUT'='10s'
-e 'PUID'='99'
-e 'PGID'='100'
-e 'UMASK'='002'
-e 'BACKUP_DIRECTORY'='/updater/data/backup'
-e 'BACKUP_PERIOD'='0'
-e 'LOG_LEVEL'='info'
-e 'LOG_CALLER'='hidden'
-e 'ROOT_URL'='/'
-e 'SHOUTRRR_ADDRESSES'=''
-e 'HEALTH_SERVER_ADDRESS'='127.0.0.1:9999'
-l net.unraid.docker.managed=dockerman
-l net.unraid.docker.webui='http://[IP]:[PORT:8000]'
-l net.unraid.docker.icon='https://github.com/DiamondPrecisionComputing/unraid-templates/blob/main/templates/img/ddnsgopher.png?raw=true'
-p '8008:8000/tcp'
-v '/mnt/user/appdata/ddns-updater':'/updater/data':'rw' 'qmcgaw/ddns-updater'

 

I tried various chown and chmod commands on the config.json file but still same error message. Even if I rename the config.json to something entirely different.

Link to comment
16 minutes ago, Hoox said:

I'm trying to run the ddns container, but I keep getting "ERROR unexpected end of JSON input"

Make sure you have bind mounted the file correctly. Usually unexpected end of JSON input means it's an empty file or there is a missing bracket somewhere. The JSON you sent looks correct though, maybe try with https://jsonlint.com/ to be sure.

Link to comment
1 hour ago, biggiesize said:

Make sure you have bind mounted the file correctly. Usually unexpected end of JSON input means it's an empty file or there is a missing bracket somewhere. The JSON you sent looks correct though, maybe try with https://jsonlint.com/ to be sure.

jsonlint.com says it's valid.

Any way I can debug or see if it manages to read the json file? To me it looks kind of like it doesnt even read it.

Link to comment
6 hours ago, Hoox said:

jsonlint.com says it's valid.

Any way I can debug or see if it manages to read the json file? To me it looks kind of like it doesnt even read it.

Might possibly be a permissions issue. Unraid defaults to nobody:users 99:100 for permissions. Try running these commands from the unraid terminal.

 

# Owned by user ID of Docker container (1000)

chown -R 1000 /mnt/user/appdata/ddns-updater

# all access (for creating json database file data/updates.json)

chmod 700 /mnt/user/appdata/ddns-updater

# read access only

chmod 400 /mnt/user/appdata/ddns-updater/config.json

Link to comment
On 11/3/2022 at 3:23 AM, biggiesize said:

Might possibly be a permissions issue. Unraid defaults to nobody:users 99:100 for permissions. Try running these commands from the unraid terminal.

 

# Owned by user ID of Docker container (1000)

chown -R 1000 /mnt/user/appdata/ddns-updater

# all access (for creating json database file data/updates.json)

chmod 700 /mnt/user/appdata/ddns-updater

# read access only

chmod 400 /mnt/user/appdata/ddns-updater/config.json

Thanks, did this. Still the same.

ERROR unexpected end of JSON input

Tried updating to new version also, but same error.

Link to comment
  • 1 month later...
On 11/5/2022 at 1:02 AM, Hoox said:

Thanks, did this. Still the same.

ERROR unexpected end of JSON input

Tried updating to new version also, but same error.

FYI:  I hit this same error and it's your VPN's PASSWORD.   

 

Your password probably has a quote or double quote in it.  When the JSON parser hits this, it stops.   Ideally, this would be fixed by GluetunVPN to account for these.  But, for now, after I changed my VPN's password and removed any quotes, it works.

 

Give that a try?

Link to comment
  • 3 weeks later...
25 minutes ago, biggiesize said:

For unRAID you will also have to add the qbittorrent port to FIREWALL_INPUT_PORTS. I run qbittorrent as well and have not had luck getting the ports to stay on a custom port. Your mileage may vary.

 

What specifically do you mean by the qbittorrent port?

 

Is this not the same thing I am using for FIREWALL_VPN_INPUT_PORTS? I went ahead and set FIREWALL_INPUT_PORTS to the same value as FIREWALL_VPN_INPUT_PORTS. Still behaves the same as before

Edited by halexh
Link to comment
9 hours ago, biggiesize said:

It is the port you specified for the qbittorrent webui (8081). You can also try turning the firewall off for gluetun. There is a possibility the torrent tracker is being blocked.

 

I have individually tried all of the following. I made the change, restarted the Gluetun container, restarted the qbittorrent container and each time it had the same effect: only connecting to one peer (the same peer too, which is somewhat odd) after starting the torrent for the ubuntu image:

  • Setting FIREWALL_INPUT_PORTS to 8081
  • Turning off the firewall altogether
  • Setting BLOCK_MALICIOUS to off
  • Removing OPENVPN related variables so they arent set / defined when the docker run command is run, since I am using WIREGUARD
  • Attempted to change the "192.168.0.0/16" in the DOT_PRIVATE_ADDRESS variable to 192.168.68.0/24
  • Resetting FIREWALL_OUTBOUND_SUBNETS to its default value of nothing, from the value I had of "192.168.68.0/24". Obviously no change since turning the firewall off altogether had no affect.
  • Renamed the GluetunVPN container to "gluetunvpn", to remove case sensitivity.
  • Setting the gluetunvpn container to privileged when creating/updating it in unraid.
  • Triple checked that qbittorrent container is indeed using glutetun container's network. Running ifconfig in a shell associated with each container produces identical output.
Link to comment

Go into qBittorrent settings and grab the listening port on the connections tab and set the network interface back to 'any'.

 

Then try using this for your gluetun run command:

 

-e 'FIREWALL_VPN_INPUT_PORTS'='8081,<listening port from qBittorrent>'

-e 'FIREWALL_INPUT_PORTS'='8081,<listening port from qBittorrent>'

-p '<listening port from qBittorrent>:<listening port from qBittorrent>/tcp'

-p '<listening port from qBittorrent>:<listening port from qBittorrent>/udp'

Link to comment
4 hours ago, biggiesize said:

Go into qBittorrent settings and grab the listening port on the connections tab and set the network interface back to 'any'.

 

Then try using this for your gluetun run command:

 

-e 'FIREWALL_VPN_INPUT_PORTS'='8081,<listening port from qBittorrent>'

-e 'FIREWALL_INPUT_PORTS'='8081,<listening port from qBittorrent>'

-p '<listening port from qBittorrent>:<listening port from qBittorrent>/tcp'

-p '<listening port from qBittorrent>:<listening port from qBittorrent>/udp'

 

In this case, <listening port from qBittorrent> is the same value as <Port Mullvad Provided>. I believe that is what you would expect, right? In any case, I still get the same results - one connection and the icon implying I am firewalled.

Link to comment
2 hours ago, biggiesize said:

Try one more time to set the firewall to false. If it is still failing then it's not being blocked. I'm also assuming you are at least restarting qBittorrent each time you rebuild gluetun.

 

Yea I am restarting qBittorrent container each time I rebuild gluetun. Tried it again with the firewall set to false. Still having the same results as before.

 

For comparison, I went and setup binhex's delugevpn container, and that worked like a charm on the exact same torrent. Both gluetun and delugevpn claim they are up and running, and the results of 

curl -sd port=<Port Mullvad Provided> https://canyouseeme.org | grep -o 'Success\|Error'

are successful on both containers. Wish I could get gluetun working though - seems better, and I like that I can use it with any torrent client.

 

I also have a Nordvpn account, and I initially setup the nordlynx container with qbittorrent. When I run that, it works quite well, and I dont get the same firewalled icon. I figured obtaining a VPN that was capable of port forwarding would improve things further, so I gave Mullvad a try, which led me to Gluetun.

Edited by halexh
Link to comment

Hello, I am trying to get DNSOMatic to update using DDNSUpdater, but for whatever reason, it is giving me ERROR malformed password. I tried turning on debug logging but all that did was add the config file to the logs and then it shuts down. Am I missing something? My password is 20 characters long and only has one special character in it a "$" sign, wondering if that was an issue.

{ "provider": "dnsomatic", "host": "*", "username": "***@gmail.com", "password": "***", "ip_version": "ipv4" }

 

I posted this originally in Discussions on the GitHub page but have not got a response there so I thought I might try here.

 

Thanks for the help!

Link to comment

Hi, I'm hoping this is the correct way to ask for support.  Is it really just one long page for everyone's support questions and we all just wade through sometimes dozens of pages for a response?

 

I've installed the Gluetun docker through CA and set it up as the wiki instructs with my provider ProtonVPN.  I've set username, password, and my provider via the install settings for the docker and left everything else to defaults per the instructions.

 

However, the docker instantly crashes when started and continues in a boot loop, and logs are not available until I manually stop the container.  The logs say:

 

2023-01-26T07:49:14-05:00 ERROR VPN settings: provider settings: VPN provider name is not valid: "protonvpn" can only be one of airvpn, custom, ivpn, mullvad, surfshark or windscribe

 

I'm baffled because the provider name was set during the install/compose process to protonvpn by the process itself via dropdown menu.  What needs to be done to get the container to recognize my VPN provider?

Link to comment
On 1/18/2023 at 4:55 PM, halexh said:

 

Yea I am restarting qBittorrent container each time I rebuild gluetun. Tried it again with the firewall set to false. Still having the same results as before.

 

For comparison, I went and setup binhex's delugevpn container, and that worked like a charm on the exact same torrent. Both gluetun and delugevpn claim they are up and running, and the results of 

curl -sd port=<Port Mullvad Provided> https://canyouseeme.org | grep -o 'Success\|Error'

are successful on both containers. Wish I could get gluetun working though - seems better, and I like that I can use it with any torrent client.

 

I also have a Nordvpn account, and I initially setup the nordlynx container with qbittorrent. When I run that, it works quite well, and I dont get the same firewalled icon. I figured obtaining a VPN that was capable of port forwarding would improve things further, so I gave Mullvad a try, which led me to Gluetun.

I use the same VPN provider and the same theoretical setup and I do not have the same issues. It could be that the qBittorent container is not successfully routing traffic through Gluetun.

 

Try running this from the terminal in unraid and see if it matches your VPN or your WAN IP (Change the container name to whatever the name of the Gluetun container is running as.

 

docker run --rm --network=container:gluetun alpine:3.14 sh -c "apk add wget && wget -qO- https://ipinfo.io"

Link to comment
On 1/18/2023 at 8:31 PM, muslimsteel said:

Hello, I am trying to get DNSOMatic to update using DDNSUpdater, but for whatever reason, it is giving me ERROR malformed password. I tried turning on debug logging but all that did was add the config file to the logs and then it shuts down. Am I missing something? My password is 20 characters long and only has one special character in it a "$" sign, wondering if that was an issue.

{ "provider": "dnsomatic", "host": "*", "username": "***@gmail.com", "password": "***", "ip_version": "ipv4" }

 

I posted this originally in Discussions on the GitHub page but have not got a response there so I thought I might try here.

 

Thanks for the help!

I am not sure how he is escaping characters in his Go coding. Instead of asking in a Discussion I would open an Issue for it. An answer probably won't be immediate because of his current work restraints.

Link to comment
5 hours ago, skarn said:

Hi, I'm hoping this is the correct way to ask for support.  Is it really just one long page for everyone's support questions and we all just wade through sometimes dozens of pages for a response?

 

I've installed the Gluetun docker through CA and set it up as the wiki instructs with my provider ProtonVPN.  I've set username, password, and my provider via the install settings for the docker and left everything else to defaults per the instructions.

 

However, the docker instantly crashes when started and continues in a boot loop, and logs are not available until I manually stop the container.  The logs say:

 

2023-01-26T07:49:14-05:00 ERROR VPN settings: provider settings: VPN provider name is not valid: "protonvpn" can only be one of airvpn, custom, ivpn, mullvad, surfshark or windscribe

 

I'm baffled because the provider name was set during the install/compose process to protonvpn by the process itself via dropdown menu.  What needs to be done to get the container to recognize my VPN provider?

Can you post the entire redacted log and a redacted screenshot of your container settings?

Link to comment
  • 4 weeks later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.